Cisco SDWAN Congiguration Guide
Cisco SDWAN Congiguration Guide
Americas Headquarters
Cisco Systems, Inc.
170 West Tasman Drive
San Jose, CA 95134-1706
USA
http://www.cisco.com
Tel: 408 526-4000
800 553-NETS (6387)
Fax: 408 527-0883
© 2019 Cisco Systems, Inc. All rights reserved.
CONTENTS
CHAPTER 2 Bridging 3
Bridging Overview 3
Components of Bridging 3
Configure Bridging 6
Configure Bridging Using vManage Templates 6
Configure Switchports 6
Configure Bridging and Bridge Domains Using CLI 9
Configure IRB 12
Bridging CLI Reference 13
Supported Protocols 15
OMP Routing Protocol 15
OMP Route Advertisements 16
OMP Route Redistribution 19
OMP Graceful Restart 22
BGP and OSPF Routing Protocols 22
Configure Unicast Overlay Routing 23
Configure BGP Using vManage Templates 23
Configure BGP Using CLI 31
Configure OSPF Using vManage Templates 35
Configure OSPF Using CLI 41
Configure OMP Using vManage Templates 43
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
iii
Contents
CHAPTER 5 Segmentation 67
Segmentation in Cisco SD-WAN 68
VPNs Used in Cisco SD-WAN Segmentation 70
Configure VPNs Using vManage Templates 71
Create a VPN Template 71
Configure Basic VPN Parameters 72
Configure Basic Interface Functionality 73
Create a Tunnel Interface 74
Configure DNS and Static Hostname Mapping 77
Configure Segmentation Using CLI 78
Configure VPNs Using CLI 78
Segmentation (VPNs ) Configuration Examples 86
Use Case: Exchange Data Traffic within a Single Private WAN 91
Use Case: Exchange Data Traffic between Two Private WANs 94
Segmentation CLI Reference 95
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
iv
Contents
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
v
Contents
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
vi
CHAPTER 1
What's New for Cisco SD-WAN
This chapter describes what's new in Cisco SD-WAN for each release.
• What's New for Cisco SD-WAN Release 19.2.x , on page 1
Feature Description
Getting Started
Tenant data backup solution in Starting from Cisco SD-WAN release 19.2.1, when databases are shared
multitenant mode by multiple tenants in2 a multitenant mode, you can back up data for a
specific tenant and restore it.
Secure Shell Authentication Using This feature enables secure shell authentication between a client and a
RSA Keys Cisco SD-WAN server using RSA keys. For related information, see
SSH Authentication using vManage on Cisco XE SD-WAN Devices.
Policies
Packet Duplication for Noisy This feature helps mitigate packet loss over noisy channels, thereby
Channels maintaining high application QoE for voice and video. This feature is
supported on Cisco XE SD-WAN devices as well as on Cisco vEdge
devices. For related information, see Configure and Monitor Packet
Duplication.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
1
What's New for Cisco SD-WAN
What's New for Cisco SD-WAN Release 19.2.x
Feature Description
Control Traffic Flow Using Class This feature lets you control the flow of traffic into and out of a Cisco
of Service Values vEdge device's interface based on the conditions defined in the quality
of service (QoS) map. A priority field and a layer 2 class of service
(CoS) were added for configuring the re-write rule. For related
information, see Configure Localized Data Policy for IPv4 vManage.
Security
IPSec Pairwise Keys This feature enables support to create and install private pairwise IPSec
session keys to secure communication between IPSec devices and its
peers. For related information, see IPSec Pairwise Keys Overview.
Disaster Recovery for vManage This feature helps you configure vManage in an active or standby mode
to counteract hardware or software failures that may occur due to
unforeseen circumstances. For detailed information, see Configure
Disaster Recovery.
Share VNF Devices Across Service This feature lets you share Virtual Network Function (VNF) devices
Chains across service chains to improve resource utilisation and reduce resource
fragmentation. For related information, see Share VNF Devices Across
Service Chains.
Monitor Service Chain Health This feature lets you configure periodic checks on the service chain data
path and reports the overall status. To enable service chain health
monitoring, NFVIS version 3.12.1 or later should be installed on all
CSP devices in a cluster. For related information, see Monitor Service
Chain Health.
Manage PNF Devices in Service This feature lets you add Physical Network Function (PNF) devices to
Chains a network, in addition to the Virtual Network function (VNF) devices.
These PNF devices can be added to service chains and shared across
service chains, service groups, and a cluster. Inclusion of PNF devices
in the service chain can overcome the performance and scaling issues
caused by using only VNF devices in a service chain. For related
information, see Manage PNF Devices in Service Chains.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
2
CHAPTER 2
Bridging
This chapter contains these topics:
• Bridging Overview, on page 3
• Components of Bridging, on page 3
• Configure Bridging, on page 6
• Bridging CLI Reference, on page 13
Bridging Overview
A Cisco vEdge device can act as a transparent bridge, switching traffic between LANs that are part of a VLAN
at the local device's site. To implement bridging, the Cisco SD-WAN architecture defines the concept of a
bridge domain. Each bridge domain corresponds to a single VLAN. From a switching point of view, each
bridge domain is a separate broadcast domain, and each has its own Ethernet switching table (or MAC table)
to use for switching traffic within the broadcast domain. Multiple bridge domains, and hence multiple VLANs,
can coexist on a single Cisco vEdge device.
To allow hosts in different bridge domains to communicate with each other, Cisco vEdge devices support
integrated routing and bridging (IRB). IRB is implemented using logical IRB interfaces, which connect a
bridge domain to a VPN, or what might better be called a VPN domain. The VPN domain provides the Layer
3 routing services necessary so that traffic can be exchanged between different VLANs. Each bridge domain
can have a single IRB interface and can connect to a single VPN domain, and a single VPN domain can
connect to multiple bridge domains on a vEdge router. The route table in the VPN domain provides reachability
between all bridge domains which participate in that VPN domain, whether the bridge domain is located on
the local router or on a remote router.
Components of Bridging
The following figure illustrates the components of the Cisco SD-WAN bridging solution.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
3
Bridging
Components of Bridging
Bridge Domains
In standard transparent bridging, virtual LANs, or VLANs, segregate LANs into logical LANs, and each
VLAN is an isolated broadcast domain. All VLAN traffic remains in the VLAN, and it is directed to its
destination by means of Ethernet switching tables. The Cisco SD-WAN implementation of bridging overlays
the concept of a bridge domain on top of the standard VLAN: A bridge domain comprises a single VLAN,
and all the ports within a VLAN are part of a single broadcast domain. Within each broadcast domain, the
standard bridging operations of learning, forwarding, flooding, filtering, and aging are performed on VLAN
traffic to create and maintain the Ethernet switching table (or MAC table) for that VLAN, and hence for that
bridge domain.
Each bridge domain is identified by a number. The VLAN within a bridge domain is identified by an 802.1Q
identifier, which is called a VLAN tag or VLAN ID. Frames within a bridge domain can remain untagged,
or you can configure a VLAN ID to tag the frames. In the Cisco SD-WAN design, the VLAN and the VLAN
ID are the property of the bridge domain. They are not the property of an interface or a switching port.
Ports that connect to the WAN segments are associated with a bridge domain. In the Cisco SD-WAN overlay
network, these ports are the physical Gigabit Ethernet interfaces on Cisco vEdge devices. Specifically, they
are the base interfaces, for example, ge-0/0. You cannot use subinterfaces for bridge domain ports.
Each broadcast domain in the Cisco SD-WAN overlay network is uniquely identified by the combination of
bridge domain number and VLAN ID (if configured). This design means that The same VLAN ID can be
used in different bridge domains on a single Cisco vEdge device. For example, the VLAN ID 2 can exist in
bridge domain 1 and bridge domain 50. In a situation where the VLAN IDs are different, two bridge domains
can include the same port interfaces. For example, both (bridge 2, VLAN 2) and (bridge 10, VLAN 23) can
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
4
Bridging
Components of Bridging
include interfaces ge0/0 and ge0/1. Here, these two interfaces effectively become trunk ports. However,
because of how interface names are tracked internally, two bridge domains that use the same VLAN ID can
have no overlap between the interfaces in the two domains. For example, if (bridge 1, VLAN 2) includes
interfaces ge0/0 and ge0/1, these interfaces cannot be in (bridge 50, VLAN 2).
As mentioned above, all member interfaces within a VLAN are part of a single broadcast domain. Within
each broadcast domain, the standard transparent bridging operations of learning, forwarding, flooding, filtering,
and aging are performed on VLAN traffic to create and maintain the Ethernet switching table, also called the
MAC table, for that VLAN.
The Cisco SD-WAN bridging domain architecture lacks the concepts of access ports and trunk ports. However,
the Cisco SD-WAN architecure emulates these functions. For a Cisco vEdge device that has a single bridge
domain, the interfaces in the bridge emulate access ports and so the router is similar to a single switch device.
For a Cisco vEdge device with multiple bridge domains that are tagged with VLAN IDs, the interfaces in the
bridges emulate trunk ports, and you can think of each domain as corresponding to a separate switching device.
Native VLAN
Cisco SD-WAN bridge domains support 802.1Q native VLAN. All traffic sent and received on an interface
configured for native VLAN do not have a VLAN tag in its Ethernet frame. That is, they are not tagged with
a VLAN ID. If a host is connected on an interface enabled for native VLAN, the bridge domain receives no
tagged frames. If the bridge domain connects to a switch that support trunk ports or connects to a hub, the
bridge domain might receive both untagged and tagged frames.
Native VLAN is used primarily on trunk ports. VLAN provides backwards compatibility for devices that do
not support VLAN tagging. For example, native VLAN allows trunk ports to accept all traffic regardless of
what devices are connected to the port. Without native VLAN, the trunk ports would accept traffic only from
devices that support VLAN tagging.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
5
Bridging
Configure Bridging
The IP address of an IRB interface is the subnet of the VLAN that resides in the bridge domain. From a
switching perspective, the IP address of the IRB interface is part of the bridge domain.
Configure Bridging
Configure Bridging Using vManage Templates
Use the Switch Port template to configure bridging for Cisco SD-WAN.
To have a Cisco vEdge device router act as a transparent bridge, configure bridging domains on the router.
A router can have up to 16 bridging domains.
Configure Switchports
1. In vManage, go to Configuration > Templates.
2. In the Device tab, click Create Template.
3. From the Create Template drop-down, choose From Feature Template.
4. From the Device Model drop-down, select the type of device for which you are creating the template.
5. Click the Additional Templates tab located directly beneath the Description field, or scroll to the
Additional Templates section.
6. Click the plus sign (+) next to Switch Port.
7. In the Switch Port drop-down, select the port number.
8. From the lower Switch Port drop-down, click Create Template. The Switch Port template form is
displayed. The top of the form contains fields for naming the template, and the bottom contains fields
for defining switch port parameters.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
6
Bridging
Configure Switchports
9. In the Template Name field, enter a name for the template. The name can be up to 128 characters and
can contain only alphanumeric characters.
10. In the Template Description field, enter a description of the template. The description can be up to 2048
characters and can contain only alphanumeric characters.
When you first open a feature template, for each parameter that has a default value, the scope is set to Default
(indicated by a check mark), and the default setting or value is shown. To change the default or to enter a
value, click the scope drop-down to the left of the parameter field and select one of the following:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
7
Bridging
Configure Switchports
Table 2:
Device Specific Use a device-specific value for the parameter. For device-specific parameters, you
(indicated by a host cannot enter a value in the feature template. You enter the value when you attach a
icon) Viptela device to a device template .
When you click Device Specific, the Enter Key box opens. This box displays a key,
which is a unique string that identifies the parameter in a CSV file that you create.
This file is an Excel spreadsheet that contains one column for each key. The header
row contains the key names (one key per column), and each row after that
corresponds to a device and defines the values of the keys for that device. You
upload the CSV file when you attach a Viptela device to a device template. For
more information, see Create a Template Variables Spreadsheet .
To change the default key, type a new string and move the cursor out of the Enter
Key box.
Examples of device-specific parameters are system IP address, hostname, GPS
location, and site ID.
Global (indicated by a Enter a value for the parameter, and apply that value to all devices.
globe icon)
Examples of parameters that you might apply globally to a group of devices are
DNS server, syslog server, and interface MTUs.
Table 3:
Slot Enter the number of the slot in which the Layer 2 switch port module is installed.
Module Select the switch port module type, either 4 port or 8 port.
Table 4:
Parameter Description
Name
Interface Name Enter the name of the interface to associate with the bridging domain, in the format ge
slot/port.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
8
Bridging
Configure Bridging and Bridge Domains Using CLI
Parameter Description
Name
• Trunk—Configure the interface as a trunk port. You can configure one or more VLANs
on a trunk port, and the port can carry traffic for multiple VLANs.
• Allowed VLANs—Enter the numbers of the VLANs for which the trunk can
carry traffic.a description for the VLAN.
• Native VLAN ID—Enter the number of the VLAN allowed to carry untagged
traffic.
Table 5:
Age-Out Time Enter how long an entry is in the MAC table before it ages out. Set the value to 0 to
prevent entries from timing out.Range: 0, 10 through 1000000 secondsDefault: 300
seconds
Static MAC Click Add Static MAC Address to map a MAC address to a switch port. In the MAC
Address Static Address field that appears, enter the following:
• MAC Address—Enter the static MAC address to map to the switch port interface.
• Switch Port Interface Name—Enter the name of the switch port interface.
• VLAN ID—Enter the number of the VLAN for the switch port.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
9
Bridging
Configure Bridging and Bridge Domains Using CLI
Each domain is identified by a unique integer, in the range 1 through 63. Each Cisco vEdge device can
have up to 16 bridging domains.
2. Tag the bridging domain with a VLAN ID:
vEdge(config-bridge)# vlan number
After you have added physical interfaces to a VLAN, if you want to change the VLAN identifier, you must
first delete all the interfaces from the VLAN. Then configure a new VLAN identifier, and re-add the interfaces
to the VLAN.
You can also configure these optional parameters:
1. Configure a description for the VLAN interface, to help identify the interface in operational command
output:
vEdge(config-bridge)# interface ge slot
/
port
vEdge(config-interface)# description "
text description "
3. Configure a name for the VLAN, to help identify the VLAN in operational command output:
vEdge(config-bridge)# name "text description"
4. By default, a bridging domain can learn up to 1024 MAC addresses. You can modify this to a value from
0 through 4096:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
10
Bridging
Configure Bridging and Bridge Domains Using CLI
5. By default, MAC table entries age out after 300 seconds (5 minutes). You can modify this to a value from
10 through 4096 seconds:
vEdge(config-bridge)# age-time seconds
After your have configured an interface in a bridge domain, you add or change a VLAN identifier for that
domain only by first deleting the bridge domain from the configuration (with a no bridge bridge-id command)
and then reconfiguing the domain with the desired interface name and VLAN tag identifier.
To see which interfaces bridging is running on, use the show bridge interface command:
vEdge# show bridge interface
ADMIN OPER ENCAP RX RX TX TX
BRIDGE INTERFACE VLAN STATUS STATUS TYPE IFINDEX MTU PKTS OCTETS PKTS OCTETS
-------------------------------------------------------------------------------------------
2 ge0/4 27 Up Up vlan 41 1500 4 364 0 0
"Up" in the Admin Status column indicates that the interface has been configured, and "Up" in the Oper Status
column indicates that bridging is running on the interface.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
11
Bridging
Configure IRB
You can also configure the optional parameters described in the previous section.
You can also configure the optional parameters described in the section about creating a tagged VLAN.
Configure IRB
With bridging, all frame traffic remains within its VLAN. To allow frames to be passed among different
VLANs, you enable integrated routing and bridging (IRB). To do this, you create a logical IRB interface in
a VPN domain that connects to the bridge domain. Frames with destinations in other VLANs travel over the
IRB interface to the VPN domain, and the Layer 3 route table is used to forward the frames toward their
destination. The route table learns the routes to other IRB interfaces. With IRB, communication can be
established between VLANs that are connected to the same VPN. The VLANs can be both on the local vEdge
router and on a remote router.
In a minimal configuration to configure IRB, you create an IRB interface and assign it an IP address:
1. In the desired VPN, create an IRB interface:
vEdge(config)# vpn number
vEdge(config-vpn)# interface irb number
The VPN number can be any number from 1 through 65530, which correspond to service VPNs, except
for 512 (which is the management VPN). You cannot place IRB interfaces in either the transport VPN
(VPN 0) or the management VPN (VPN 512). The IRB interface type is irb. The IRB interface number
is a number from 1 through 63, and it must be the same number as the the identifier of the bridging domain
that the IRB is connected to. For example, if you configure a bridging domain with an identifier of 2 (with
the command bridge 2), the IRB interface number must be 2, and so you must configure interface irb2.
2. Configure an IP address for the IRB interface. This address is the subnet for the VLAN in the connected
bridge domain:
vEdge(config-irb)# ip address prefix/length
In all respects, the logical IRB interfaces is just another interface. This means, for instance, that you can
configure additional interfaces properties as desired. (Note, however, that you cannot configure autonegotiation
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
12
Bridging
Bridging CLI Reference
on IRB interfaces.) It also means that you can ping a logical IRB interface from another device in the same
VPN, and you can ping the interface regardless of whether a corresponding bridge exists for that IRB interface.
That is, if you configure interface irb4, but there is no corresponding bridge 4, you are still able to ping irb4.
Here is an example IRB configuration:
vEdge# show running-config vpn 1
vpn 1
interface ge0/4
ip address 10.20.24.15/24
no shutdown
!
interface irb1
ip address 1.1.1.15/24
no shutdown
access-list IRB_ICMP in
access-list IRB_ICMP out
!
interface irb50
ip address 3.3.3.15/24
no shutdown
!
!
vEdge# show running-config vpn 2
vpn 2
interface irb2
ip address 2.2.2.15/24
no shutdown
!
!
To display information about the IRB interfaces, use the show interface command. The IRB interfaces are
listed in the Interface column, and the Encapsulation Type columns marks these interfaces as "vlan".
vEdge# show interface
IF IF TCP
ADMIN OPER ENCAP SPEED MSS RX TX
VPN INTERFACE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS DUPLEX ADJUST UPTIME PACKETS PACKETS
---------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 10.1.15.15/24 Up Up null transport 1500 00:0c:29:cb:4f:9c 10 full 0 0:02:48:12 1467 1460
0 ge0/1 - Up Up null service 1500 00:0c:29:cb:4f:a6 10 full 0 0:02:48:12 0 0
0 ge0/2 - Up Up null service 1500 00:0c:29:cb:4f:b0 10 full 0 0:02:48:03 0 0
0 ge0/3 10.0.20.15/24 Up Up null service 1500 00:0c:29:cb:4f:ba 10 full 0 0:02:48:12 0 0
0 ge0/5 - Up Up null service 1500 00:0c:29:cb:4f:ce 10 full 0 0:02:48:03 0 0
0 ge0/6 - Up Up null service 1500 00:0c:29:cb:4f:d8 10 full 0 0:02:48:03 0 0
0 ge0/7 10.0.100.15/24 Up Up null service 1500 00:0c:29:cb:4f:e2 10 full 0 0:02:48:12 0 0
0 system 172.16.255.15/32 Up Up null loopback 1500 00:00:00:00:00:00 10 full 0 0:02:48:12 0 0
1 ge0/4 10.20.24.15/24 Up Up null service 1500 00:0c:29:cb:4f:c4 10 full 0 0:02:48:00 92 14
1 irb1 1.1.1.15/24 Up Up vlan service 1500 00:0c:00:00:aa:00 10 full 0 0:02:48:00 1178 0
1 irb50 3.3.3.15/24 Up Up vlan service 1500 00:0c:00:00:aa:00 10 full 0 0:02:48:00 0 0
2 irb2 2.2.2.15/24 Up Up vlan service 1500 00:0c:00:00:aa:00 10 full 0 0:02:48:01 0 0
512 eth0 10.0.1.15/24 Up Up null service 1500 00:50:56:00:01:05 1000 full 0 0:02:48:01 210 148
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
13
Bridging
Bridging CLI Reference
interface interface-name
description "text description"
native-vlan
[no] shutdown
static-mac-address mac-address
max-macs number
name text
vlan number
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
14
CHAPTER 3
Unicast Overlay Routing
The overlay network is controlled by the Cisco SD-WAN Overlay Management Protocol (OMP), which is at
the heart of Cisco SD-WAN overlay routing. This solution allows the building of scalable, dynamic, on-demand,
and secure VPNs. The Cisco SD-WAN solution uses a centralized controller for easy orchestration, with full
policy control that includes granular access control and a scalable secure data plane between all edge nodes.
The Cisco SD-WAN solution allows edge nodes to communicate directly over any type of transport network,
whether public WAN, internet, metro Ethernet, MPLS, or anything else.
• Supported Protocols, on page 15
• Configure Unicast Overlay Routing, on page 23
Supported Protocols
OMP Routing Protocol
The Cisco SD-WAN Overlay Management Protocol (OMP) is the protocol responsible for establishing and
maintaining the Cisco SD-WAN control plane. It provides the following services:
• Orchestration of overlay network communication, including connectivity among network sites, service
chaining, and VPN or VRF topologies
• Distribution of service-level routing information and related location mappings
• Distribution of data plane security parameters
• Central control and distribution of routing policy
OMP is the control protocol that is used to exchange routing, policy, and management information between
Cisco vSmart Controllers and Cisco vEdge devices in the overlay network. These devices automatically
initiate OMP peering sessions between themselves, and the two IP end points of the OMP session are the
system IP addresses of the two devices.
OMP is an all-encompassing information management and distribution protocol that enables the overlay
network by separating services from transport. Services provided in a typical VPN setting are usually located
within a VPN domain, and they are protected so that they are not visible outside the VPN. In such a traditional
architecture, it is a challenge to extend VPN domains and service connectivity.
OMP addresses these scalability challenges by providing an efficient way to manage service traffic based on
the location of logical transport end points. This method extends the data plane and control plane separation
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
15
Unicast Overlay Routing
OMP Route Advertisements
concept from within routers to across the network. OMP distributes control plane information along with
related policies. A central Cisco vSmart Controller makes all decisions related to routing and access policies
for the overlay routing domain. OMP is then used to propagate routing, security, services, and policies that
are used by edge devices for data plane connectivity and transport.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
16
Unicast Overlay Routing
OMP Route Advertisements
(OMP also advertises policies configured on the Cisco vSmart Controllers that are executed on Cisco vEdge
devices including application-routing policy, cflowd flow templates, and data policy. For more information,
see Policy Overview.)
The following figure illustrates the three types of OMP routes.
OMP Routes
Each device at a branch or local site advertises OMP routes to the Cisco vSmart Controllers in its domain.
These routes contain routing information that the device has learned from its site-local network.
A Cisco SD-WAN device can advertise one of the following types of site-local routes:
• Connected (also known as direct)
• Static
• BGP
• OSPF (inter-area, intra-area, and external)
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
17
Unicast Overlay Routing
OMP Route Advertisements
• TLOC—Transport location identifier of the next hop for the vRoute. It is similar to the BGP NEXT_HOP
attribute. A TLOC consists of three components:
• System IP address of the OMP speaker that originates the OMP route
• Color to identify the link type
• Encapsulation type on the transport tunnel
• Origin—Source of the route, such as BGP, OSPF, connected, and static, and the metric associated with
the original route.
• Originator—OMP identifier of the originator of the route, which is the IP address from which the route
was learned.
• Preference—Degree of preference for an OMP route. A higher preference value is more preferred.
• Service—Network service associated with the OMP route.
• Site ID—Identifier of a site within the Cisco SD-WAN overlay network domain to which the OMP route
belongs.
• Tag—Optional, transitive path attribute that an OMP speaker can use to control the routing information
it accepts, prefers, or redistributes.
• VPN—VPN or network segment to which the OMP route belongs.
You configure some of the OMP route attribute values, including the system IP, color, encapsulation type,
carrier, preference, service, site ID, and VPN. You can modify some of the OMP route attributes by provisioning
control policy on the Cisco vSmart Controller.
TLOC Routes
TLOC routes identify transport locations. These are locations in the overlay network that connect to physical
transport, such as the point at which a WAN interface connects to a carrier. A TLOC is denoted by a 3-tuple
that consists of the system IP address of the OMP speaker, a color, and an encapsulation type. OMP advertises
each TLOC separately.
TLOC routes advertise the following attributes:
• TLOC private address—Private IP address of the interface associated with the TLOC.
• TLOC public address—NAT-translated address of the TLOC.
• Carrier—An identifier of the carrier type, which is generally used to indicate whether the transport is
public or private.
• Color—Identifies the link type.
• Encapsulation type—Tunnel encapsulation type.
• Preference—Degree of preference that is used to differentiate between TLOCs that advertise the same
OMP route.
• Site ID—Identifier of a site within the Cisco SD-WAN overlay network domain to which the TLOC
belongs.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
18
Unicast Overlay Routing
OMP Route Redistribution
• Tag—Optional, transitive path attribute that an OMP speaker can use to control the flow of routing
information toward a TLOC. When an OMP route is advertised along with its TLOC, both or either can
be distributed with a community TAG, to be used to decide how send traffic to or receive traffic from a
group of TLOCs.
• Weight—Value that is used to discriminate among multiple entry points if an OMP route is reachable
through two or more TLOCs.
The IP address used in the TLOC is the fixed system address of the device itself. The reason for not using an
IP address or an interface IP address to denote a TLOC is that IP addresses can move or change; for example,
they can be assigned by DHCP, or interface cards can be swapped. Using the system IP address to identify a
TLOC ensures that a transport end point can always be identified regardless of IP addressing.
The link color represents the type of WAN interfaces on a device. The Cisco SD-WAN solution offers
predefined colors, which are assigned in the configuration of the devices. The color can be one of default, 3g,
biz-internet, blue, bronze, custom1, custom2, custom3, gold, green, lte, metro-ethernet, mpls, private1, private2,
public-internet, red, and silver.
The encapsulation is that used on the tunnel interface. It can be either IPsec or GRE.
The diagram to the right shows a device that has two WAN connections and hence two TLOCs. The system
IP address of the router is 1.1.1.1. The TLOC on the left is uniquely identified by the system IP address 1.1.1.1,
the color metro-ethernet, and the encapsulation IPsec, and it maps to the physical WAN interface with the IP
address 184.168.0.69. The TLOC on the right is uniquely identified by the system IP address 1.1.1.1, the color
biz-internet, and the encapsulation IPsec, and it maps to the WAN IP address 75.1.1.1.
You configure some of the TLOC attributes, including the system IP address, color, and encapsulation, and
you can modify some of them by provisioning control policy on the Cisco vSmart Controller. See Centralized
Control Policy.
Service Routes
Service routes represent services that are connected to a Cisco vEdge device or to the local-site network in
which the Cisco vEdge device resides. The Cisco vEdge device advertises these routes to Cisco vSmart
Controllers using service address family NLRI. See Service Chaining.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
19
Unicast Overlay Routing
OMP Route Redistribution
To avoid routing loops and less than optimal routing, redistribution of following types of routes requires
explicit configuration:
• BGP
• OSPF external routes
To avoid propagating excessive routing information from the edge to the access portion of the network, the
routes that devices receive via OMP are not automatically redistributed into the other routing protocols running
on the routers. If you want to redistribute the routes received via OMP, you must enable this redistribution
locally on each device.
OMP sets the origin and sub-origin type in each OMP route to indicate the route's origin (see the table below).
When selecting routes, the Cisco vSmart Controllerand the router take the origin type and subtype into
consideration.
Table 6:
Connected —
Static —
OMP also carries the metric of the original route. A metric of 0 indicates a connected route.
Administrative Distance
Administrative distance is the measure used to select the best path when there are two or more different routes
to the same destination from multiple routing protocols. When the Cisco vSmart Controller or the router is
selecting the OMP route to a destination, it prefers the one with the lower or lowest administrative distance
value.
The following table lists the default administrative distances used by the Cisco SD-WAN devices:
Table 7:
Connected 0
Static 1
NAT (NAT and static routes cannot coexist in the same VPN; NAT overwrites 1
static routes)
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
20
Unicast Overlay Routing
OMP Route Redistribution
GRE 5
EBGP 20
OSPF 110
IBGP 200
OMP 250
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
21
Unicast Overlay Routing
OMP Graceful Restart
A Cisco vEdge device installs an OMP route in its forwarding table (FIB) only if the TLOC to which it points
is active. For a TLOC to be active, an active BFD session must be associated with that TLOC. BFD sessions
are established by each device which creates a separate BFD session with each of the remote TLOCs. If a
BFD session becomes inactive, the Cisco vSmart Controller removes from the forwarding table all the OMP
routes that point to that TLOC.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
22
Unicast Overlay Routing
Configure Unicast Overlay Routing
Service-Side Routing
Provisioning BGP and OSPF enables routing on the service side of the network.
To set up routing on a Cisco vEdge device, you provision one VPN or multiple VPNs if segmentation is
required. Within each VPN, you configure the interfaces that participate in that VPN and the routing protocols
that operate in that VPN.
Because Cisco vSmart Controllers never participate in a local site network, you never configure BGP or OSPF
on these devices.
Transport-Side Routing
To enable communication between Cisco SD-WAN devices, you configure OSPF or BGP on a loopback
interface in VPN 0. The loopback interface is a virtual transport interface that is the terminus of the DTLS
and IPsec tunnel connections required for Cisco XE SD-WAN devices and Cisco vEdge devices to participate
in the overlay network.
To configure service-side and transport-side BGP using vManage, see the Configure BGP using vManage .
To configure service-side and transport-side BGP using CLI, see the Configure BGP Using CLI topic.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
23
Unicast Overlay Routing
Configure BGP Using vManage Templates
c. From the BGP drop-down, click Create Template. The BGP template form displays. The top of the
form contains fields for naming the template, and the bottom contains fields for defining BGP
parameters.
6. To create a template for VPNs 1 through 511, and 513 through 65530:
a. Click the Service VPN tab located directly beneath the Description field, or scroll to the Service VPN
section.
b. Click the Service VPN drop-down.
c. Under Additional VPN Templates, located to the right of the screen, click BGP.
d. From the BGP drop-down, click Create Template. The BGP template form displays. The top of the
form contains fields for naming the template, and the bottom contains fields for defining BGP
parameters.
7. In the Template Name field, enter a name for the template. The name can be up to 128 characters and
can contain only alphanumeric characters.
8. In the Template Description field, enter a description of the template. The description can be up to 2048
characters and can contain only alphanumeric characters.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
24
Unicast Overlay Routing
Configure BGP Using vManage Templates
Local Routes Distance Specify the BGP route administrative distance for routes within the local AS. By
default, a route received locally from BGP is preferred over a route received from
OMP.
Range: 0 through 255
Default: 0
External Routes Specify the BGP route administrative distance for routes learned from other sites
Distance in the overlay network.
Range: 0 through 255
Default: 0
For service-side BGP, you might want to configure Overlay Management Protocol (OMP) to advertise to the
Cisco vSmart Controller any BGP routes that the device learns. By default, Cisco SD-WAN devices advertise
to OMP both the connected routes on the device and the static routes that are configured on the device, but it
does not advertise BGP external routes learned by the device. You configure this route advertisement in the
OMP template for devices or Cisco SD-WAN software. See OMP.
For transport-side BGP, you must also configure a physical interface and a loopback interface in VPN 0. In
addition, you should create a policy for BGP to advertise the loopback interface address to its neighbors, and
apply the policy in the BGP instance or to a specific neighbor.
To save the feature template, click Save.
Mark as Check Mark as Optional Row to mark this configuration as device-specific. To include
Optional Row this configuration for a device, enter the requested variable values when you attach a device
template to a device, or create a template variables spreadsheet to apply the variables.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
25
Unicast Overlay Routing
Configure BGP Using vManage Templates
Route Policy Enter the name of the route policy to apply to redistributed routes.
Click Add to save the redistribution information.
Network Click Network > New Network.
Mark as Check Mark as Optional Row to mark this configuration as
Optional Row device-specific. To include this configuration for a device, enter the
requested variable values when you attach a device template to a device,
or create a template variables spreadsheet to apply the variables.
Network Prefix Enter a network prefix, in the format prefix/length to be advertised by
BGP.
Click Add to save the network prefix.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
26
Unicast Overlay Routing
Configure BGP Using vManage Templates
AS Set Path Click On to generate set path information for the aggregated prefixes.
Summary Only Click On to filter out more specific routes from BGP updates.
Click Add to save the aggregate address.
Note For BGP to function, you must configure at least one neighbor.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
27
Unicast Overlay Routing
Configure BGP Using vManage Templates
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
28
Unicast Overlay Routing
Configure BGP Using vManage Templates
Password Enter a password to use to generate an MD5 message digest. Configuring the
password enables MD5 authentication on the TCP connection with the BGP peer.
The password is case-sensitive and can be up to 25 characters long. It can contain
any alphanumeric characters, including spaces. The first character cannot be a
number.
Keepalive Time Specify the frequency at which keepalive messages are advertised to a BGP peer.
These messages indicate to the peer that the local router is still active and should
be considered available. Specify the keepalive time for the neighbor to override
the global keepalive time.
Range: 0 through 65535 seconds
Default: 60 seconds (one-third the hold-time value)
Hold Time Specify the interval after not receiving a keepalive message that the local BGP
session considers its peer to be unavailable. The local router then terminates the
BGP session to that peer. Specify the hold time for the neighbor to override the
global hold time.
Range: 0 through 65535 seconds
Default: 180 seconds (three times the keepalive timer)
Connection Retry Specify the number of seconds between retries to establish a connection to a
Time configured BGP neighbor peer that has gone down.
Range: 0 through 65535 seconds
Default: 30 seconds
Advertisement Interval For the BGP neighbor, set the minimum route advertisement interval (MRAI)
between when BGP routing update packets are sent to that neighbor.
Range: 0 through 600 seconds
Default: 5 seconds for IBGP route advertisements; 30 seconds for EBGP route
advertisements
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
29
Unicast Overlay Routing
Configure BGP Using vManage Templates
Use a device-specific value for the parameter. For device-specific parameters, you
cannot enter a value in the feature template. You enter the value when you attach
Device Specific a device to a device template.
When you click Device Specific, the Enter Key box opens. This box displays a key
which is a unique string that identifies the parameter in a CSV file that you create.
This file is an Excel spreadsheet that contains one column for each key. The header
row contains the key names (one key per column), and each row after that
corresponds to a device and defines the values of the keys for that device. You
upload the CSV file when you attach a device to a device template.
To change the default key, type a new string and move the cursor out of the Enter
Key box.
Examples of device-specific parameters are system IP address, hostname, GPS
location, and site ID.
Enter a value for the parameter, and apply that value to all devices.
Global Examples of parameters that you might apply globally to a group of devices are
DNS server, syslog server, and interface MTUs.
Keepalive Specify the frequency at which keepalive messages are advertised to a BGP peer.
These messages indicate to the peer that the local device is still active and should
be considered available. This keepalive time is the global keepalive time.
Range: 0 through 65535 seconds
Default: 60 seconds (one-third the hold-time value)
Compare MED Click On to compare the device IDs among BGP paths to determine the active path.
Deterministic MED Click On to compare multiple exit discriminators (MEDs) from all routes received
from the same AS, regardless of when the route was received.
Missing MED as Click On to consider a path as the worst path if the path is missing a MED attribute.
Worst
Compare Router ID Click On to always compare MEDs regardless of whether the peer ASs of the
compared routes are the same.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
30
Unicast Overlay Routing
Configure BGP Using CLI
vpn-id can be any service-side VPN, which is a VPN other than VPN 0 and VPN 512. VPN 0 is the
transport VPN and carries only control traffic, and VPN 512 is the management VPN.
2. Configure BGP to run in the VPN:
a. Configure the local AS number:
vEdge(config-vpn)# router bgp local-as-number
You can specify the AS number in 2-byte ASDOT notation (1 through 65535) or in 4-byte ASDOT
notation (1.0 through 65535.65535).
b. Configure the BGP peer, specifying its address and AS number (the remote AS number), and enable
the connection to the peer:
vEdge(config-bgp)# neighbor address remote-as remote-as-number
vEdge(config-bgp)# no shutdown
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
31
Unicast Overlay Routing
Configure BGP Using CLI
!
!
!
ip route 0.0.0.0/0 10.0.16.13
!
You can also redistribute routes learned from other protocols into BGP:
Device(config-bgp)# address-family ipv4-unicast redistribute (connected | nat |
natpool-outside | ospf | static) [route-policy policy-name]
In the BGP route redistribution commands, the optional route policy is applied to the routes that are redistributed
into BGP or routes that are redistributed out from BGP.
You can configure the Cisco vEdge device to advertise BGP routes that it has learned, through OMP, from
the Cisco vSmart Controller. Doing so allows the Cisco vSmart Controller to advertise these routes to other
Cisco vEdge devices in the overlay network. You can advertise BGP routes either globally or for a specific
VPN:
vEdge(config)# omp advertise bgp
When you configure BGP to propagate AS path information, the router sends AS path information to routers
that are behind the vEdge router (in the service-side network) that are running BGP, and it receives AS path
information from these routers. If you are redistributing BGP routes into OMP or into another protocol, or if
you are advertising BGP routes to OMP, the AS path information is included in the advertised BGP routes.
If you configure BGP AS path propagation on some but not all vEdge routers in the overlay network, the
routers on which it is not configured receive the AS path information but they do not forward it to the BGP
routers in their local service-side network. Propagating AS path information can help to avoid BGP routing
loops.
In networks that have both overlay and underlay connectivity—for example, when vEdge routers are
interconnected by both a Cisco SD-WAN overlay network and an MPLS underlay network—you can assign
an AS number to OMP itself. For vEdge routers running BGP, this overlay AS number is included in the AS
path of BGP route updates. To configure the overlay AS:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
32
Unicast Overlay Routing
Configure BGP Using CLI
Device(config)# omp
vEdge(omp)# overlay-as as-number
You can specify the AS number in 2-byte ASDOT notation (1 through 65535) or in 4-byte ASDOT notation
(1.0 through 65535.65535). As a best practice, it is recommended that the overlay AS number be a unique
AS number within both the overlay and the underlay networks. That use, select an AS number that is not used
elsewhere in the network.
If you configure the same overlay AS number on multiple vEdge routers in the overlay network, all these
routers are considered to be part of the same AS, and as a result, they do not forward any routes that contain
the overlay AS number. This mechanism is an additional technique for preventing BGP routing loops in the
network.
4. Create a policy for BGP to advertise the loopback interface address to its neighbors:
vEdge(config)# policy lists prefix-list prefix-list-name ip-prefix prefix
prefix is the IP address of the loopback interface.
6. Reference the policy in the BGP instance. To apply the policy such that the loopback address is advertised
to all BGP neighbors:
Device(config)# vpn 0 router bgp local-as-number address-family ipv4-unicast redistribute
connected route-policy policy-name
Specify out in the second command so that BGP advertises the loopback prefix out to the neighbor.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
33
Unicast Overlay Routing
Configure BGP Using CLI
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
34
Unicast Overlay Routing
Configure OSPF Using vManage Templates
5. To create a template for VPNs 1 through 511, and 513 through 65530:
a. Click the Service VPN tab located directly beneath the Description field, or scroll to the Service VPN
section.
b. Click the Service VPN drop-down.
c. Under Additional VPN Templates, located to the right of the screen, click OSPF.
d. From the OSPF drop-down, click Create Template. The OSPF template form is displayed. The top
of the form contains fields for naming the template, and the bottom contains fields for defining OSPF
parameters.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
35
Unicast Overlay Routing
Configure OSPF Using vManage Templates
6. In the Template Name field, enter a name for the template. The name can be up to 128 characters and can
contain only alphanumeric characters.
7. In the Template Description field, enter a description of the template. The description can be up to 2048
characters and can contain only alphanumeric characters.
When you first open a feature template, for each parameter that has a default value, the scope is set to Default
(indicated by a check mark), and the default setting or value is shown. To change the default or to enter a
value, click the scope drop-down to the left of the parameter field and select one of the following:
Table 8:
Device Specific Use a device-specific value for the parameter. For device-specific parameters, you
(indicated by a host cannot enter a value in the feature template. You enter the value when you attach a
icon) Cisco SD-WAN device to a device template .
When you click Device Specific, the Enter Key box opens. This box displays a
key,which is a unique string that identifies the parameter in a CSV file that you
create. This file is an Excel spreadsheet that contains one column for each key. The
header row contains the key names (one key per column), and each row after that
corresponds to a device and defines the values of the keys for that device. You
upload the CSV file when you attach a Cisco SD-WAN device to a device template.
For more information, see Create a Template Variables Spreadsheet .
To change the default key, type a new string and move the cursor out of the Enter
Key box.
Examples of device-specific parameters are system IP address, hostname, GPS
location, and site ID.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
36
Unicast Overlay Routing
Configure OSPF Using vManage Templates
Global (indicated by a Enter a value for the parameter, and apply that value to all devices.
globe icon)
Examples of parameters that you might apply globally to a group of devices are
DNS server, syslog server, and interface MTUs.
Table 9:
Router ID Enter the OSPF router ID in decimal four-part dotted notation. This is the IP
address associated with the router for OSPF adjacencies.
Distance for External Routes Specify the OSPF route administration distance for routes learned from other
domains.
Range: 0 through 255Default: 110
Distance for Inter-Area Specify the OSPF route administration distance for routes coming from one
Routes area into another.
Range: 0 through 255Default: 110
Distance for intra-Area routes Specify the OSPF route administration distance for routes within an area.
Range: 0 through 255Default: 110
Table 10:
Parameter Description
Name
Protocol Select the protocol from which to redistribute routes into OSPF. Select from BGP,
Connected, NAT, OMP, and Static.
Route Policy Enter the name of a localized control policy to apply to routes before they are redistributed
into OSPF.
To add another OSPF route redistribution policy, click the plus sign (+).
To remove an OSPF route redistribution policy from the template configuration, click the trash icon to the
right of the entry.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
37
Unicast Overlay Routing
Configure OSPF Using vManage Templates
Table 11:
Advertisement If you selected On-Startup, specify the number of seconds to advertise the maximum
Time metric after the router starts up.
Range: 0, 5 through 86400 secondsDefault: 0 seconds (the maximum metric is advertised
immediately when the router starts up)
Table 12:
Set the Area Select the type of OSPF area, Stub or NSSA.
Type
No Summary Select On to not inject OSPF summary routes into the area.
Translate If you configured the area type as NSSA, select when to allow Cisco SD-WAN devices
that are ABRs (area border routers) to translate Type 7 LSAs to Type 5 LSAs:
• Always—Router always acts as the translator for Type 7 LSAs. That is no other
router, even if it is an ABR, can be the translator. If two ABRs are configured to
always be the translator, only one of them actually ends up doing the translation.
• Candidate—Router offers translation services, but does not insist on being the
translator.
• Never—Translate no Type 7 LSAs.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
38
Unicast Overlay Routing
Configure OSPF Using vManage Templates
Table 13:
Interface Name Enter the name of the interface, in the format ge slot/port or loopback number.
Hello Interval Specify how often the router sends OSPF hello packets.
Range: 1 through 65535 secondsDefault: 10 seconds
Dead Interval Specify how often the Cisco vEdge device must receive an OSPF hello packet
from its neighbor. If no packet is received, the Cisco vEdge deviceassumes
that the neighbor is down.
Range: 1 through 65535 secondsDefault: 40 seconds (4 times the default hello
interval)
LSA Retransmission Specify how often the OSPF protocol retransmits LSAs to its neighbors.
Interval
Range: 1 through 65535 secondsDefault: 5 seconds
To configure advanced options for an interface in an OSPF area, in the Add Interface popup, click Advanced
Options and configure the following parameters:
Table 14:
Designated Router Set the priority of the router to be elected as the designated router (DR). The
Priority router with the highest priority becomes the DR. If the priorities are equal, the
node with the highest router ID becomes the DR or the backup DR.Range: 0
through 255Default: 1
OSPF Network Type Select the OSPF network type to which the interface is to connect:
• Broadcast network—WAN or similar network.
• Point-to-point network—Interface connects to a single remote OSPF router.
Default: Broadcast
Passive Interface Select On or Off to specify whether to set the OSPF interface to be passive. A
passive interface advertises its address, but does not actively run the OSPF
protocol.Default: Off
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
39
Unicast Overlay Routing
Configure OSPF Using vManage Templates
Authentication Specify the authentication and authentication key on the interface to allow OSPF
to exchange routing update information securely.
• Authentication Key Enter the authentication key. Plain text authentication is used when devices within
an area cannot support the more secure MD5 authentication. The key can be 1
to 32 characters.
Message Digest Specify the key ID and authentication key if you are using message digest (MD5).
• Message Digest Key ID Enter the key ID for message digest (MD5 authentication). It can be 1 to 32
characters.
• Message Digest Key Enter the MD5 authentication key in clear text or as an AES-encrypted key. It
can be from 1 to 255 characters.
Table 15:
Parameter Description
Name
Address Enter the IP address and subnet mask, in the format prefix/length for the IP addresses to
be consolidated and advertised.
Cost Specify a number for the Type 3 summary LSA. OSPF uses this metric during its SPF
calculation to determine the shortest path to a destination.Range: 0 through 16777215
No Advertise Select On to not advertise the Type 3 summary LSAs or Off to advertise them.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
40
Unicast Overlay Routing
Configure OSPF Using CLI
Table 16:
Reference Bandwidth Specify the reference bandwidth for the OSPF auto-cost calculation for the interface.
Range: 1 through 4294967 MbpsDefault: 100 Mbps
RFC 1538 By default, the OSPF calculation is done per RFC 1583. Select Off to calculate the
Compatible cost of summary routes based on RFC 2328.
Originate Click On to generate a default external route into an OSPF routing domain:
• Always—Select On to always advertise the default route in an OSPF routing
domain.
• Default metric—Set the metric used to generate the default route.Range: 0
through 16777214Default: 10
• Metric type—Select to advertise the default route as an OSPF Type 1 external
route or an OSPF Type 2 external route.
SPF Calculation Specify the amount of time between when the first change to a topology is received
Delay until performing the SPF calculation.
Range: 0 through 600000 milliseconds (60 seconds)Default: 200 milliseconds
Initial Hold Time Specify the amount of time between consecutive SPF calculations.
Range: 0 through 600000 milliseconds (60 seconds)Default: 1000 milliseconds
Maximum Hold Time Specify the longest time between consecutive SPF calculations.
Range: 0 through 600000Default: 10000 milliseconds (60 seconds)
Policy Name Enter the name of a localized control policy to apply to routes coming from OSPF
neighbors.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
41
Unicast Overlay Routing
Configure OSPF Using CLI
vpn-id can be any VPN number except VPN 0 and VPN512. VPN 0 is the transport VPN and carries only
control traffic, and VPN 512 is the management interface.
2. Configure OSPF area 0 and the interfaces that participate in that area:
vEdge(config-vpn)# router ospf
vEdge(config-ospf)# area 0
vEdge(config-area-0)# interface interface-name
vEdge(config-interface)# ip-address address
vEdge(config-interface)# no shutdown
vEdge (ospf-if)# exit
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
42
Unicast Overlay Routing
Configure OMP Using vManage Templates
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
43
Unicast Overlay Routing
Configure OMP Using vManage Templates
OMP is enabled by default on all Cisco vEdge devices, Cisco vManage NMSs, and Cisco vSmart Controllers,
so there is no need to explicitly enable OMP. OMP must be operational for the Cisco SD-WAN overlay
network to function. If you disable it, you disable the overlay network.
7. In the Template Description field, enter a description of the template. The description can be up to 2048
characters and can contain only alphanumeric characters.
When you first open a feature template, for each parameter that has a default value, the scope is set to Default
(indicated by a check mark), and the default setting or value is shown. To change the default or to enter a
value, click the scope drop-down to the left of the parameter field and select one of the following:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
44
Unicast Overlay Routing
Configure OMP Using vManage Templates
Table 17:
Device Specific Use a device-specific value for the parameter. For device-specific parameters, you
(indicated by a host cannot enter a value in the feature template. You enter the value when you attach a
icon) Cisco SD-WAN device to a device template .
When you click Device Specific, the Enter Key box opens. This box displays a key,
which is a unique string that identifies the parameter in a CSV file that you create.
This file is an Excel spreadsheet that contains one column for each key. The header
row contains the key names (one key per column), and each row after that
corresponds to a device and defines the values of the keys for that device. You
upload the CSV file when you attach a Cisco SD-WAN device to a device template.
For more information, see Create a Template Variables Spreadsheet .
To change the default key, type a new string and move the cursor out of the Enter
Key box.
Examples of device-specific parameters are system IP address, hostname, GPS
location, and site ID.
Global (indicated by a Enter a value for the parameter, and apply that value to all devices.
globe icon)
Examples of parameters that you might apply globally to a group of devices are
DNS server, syslog server, and interface MTUs.
Table 18:
Graceful Restart for OMP Ensure that Yes is selected to enable graceful restart. By default, graceful
restart for OMP is enabled.
Overlay AS Number (on Specify a BGP AS number that OMOP advertises to the router's BGP
vEdge routers only) neighbors.
Graceful Restart Timer Specify how often the OMP information cache is flushed and refreshed. A
timer value of 0 disables OMP graceful restart.Range: 0 through 604800
seconds (168 hours, or 7 days)Default: 43200 seconds (12 hours)
Number of Paths Advertised Specify the maximum number of equal-cost routes to advertise per prefix.
per Prefix Cisco vEdge devices advertise routes to Cisco vSmart Controllers, and the
controllers redistributes the learned routes, advertising each route-TLOC
tuple. A Cisco vEdge device can have up to four TLOCs, and by default
advertises each route-TLOC tuple to the Cisco vSmart Controller. If a local
site has two Cisco vEdge devices, a Cisco vSmart Controller could potentially
learn eight route-TLOC tuples for the same route. If the configured limit is
lower than the number of route-TLOC tuples, the best route or routes are
advertised.Range: 1 through 16Default: 4
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
45
Unicast Overlay Routing
Configure OMP Using vManage Templates
ECMP Limit (on vEdge Specify the maximum number of OMP paths received from the Cisco vSmart
routers only) Controller that can be installed in the Cisco vEdge device'slocal route table.
By default, a Cisco vEdge device installs a maximum of four unique OMP
paths into its route table.Range: 1 through 32Default: 4
Send Backup Paths (on Click On to have OMP advertise backup routes to Cisco vEdge devices. By
vSmart Controllers only) default, OMP advertises only the best route or routes. If you configure to
send backup paths, OMP also advertises the first non-best route in addition
to the best route or routes.
Discard rejected (on vSmart Click Yes to have OMP discard routes that have been rejected on the basis
controllers only) of policy. By default, rejected routes are not discarded.
Table 19:
Hold Time Specify how long to wait before closing the OMP connection to a peer. If the peer
does not receive three consecutive keepalive messages within the hold time, the OMP
connection to the peer is closed.Range: 0 through 65535 secondsDefault: 60 seconds
EOR Timer Specify how long to wait after an OMP session has gone down and then come back
up to send an end-of-RIB (EOR) marker. After this marker is sent, any routes that
were not refreshed after the OMP session came back up are considered to be stale
and are deleted from the route table.Range: 1 through 3600 seconds (1 hour)Default:
300 seconds (5 minutes)
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
46
Unicast Overlay Routing
Configure OMP Using CLI
Table 20:
Parameter Description
Name
Advertise Click On or Off to enable or disable the Cisco vEdge device advertising to OMP the routes
that it learns locally:
• BGP—Click On to advertise BGP routes to OMP. By default, BGP routes are not
advertised to OMP.
• Connected—Click Off to disable advertising connected routes to OMP. By default,
connected routes are advertised to OMP.
• OSPF—Click On and click On again in the External field that appears to advertise
external OSPF routes to OMP. OSPF inter-area and intra-area routes are always
advertised to OMP. By default, external OSPF routes are not advertised to OMP.
• Static—Click Off to disable advertising static routes to OMP. By default static routes
are advertised to OMP.
To configure per-VPN route advertisements to OMP, use the VPN feature template .
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
47
Unicast Overlay Routing
Configure OMP Using CLI
The graceful restart timer is set up independently on each OMP peer; that is, it is set up separately on each
Cisco vEdge Deviceand vSmart controller. To illustrate what this means, let's consider a vSmart controller
that uses a graceful restart time of 300 seconds, or 5 minutes, and a Cisco vEdge Device that is configured
with a timer of 600 seconds (10 minutes). Here, the vSmart controller retains the OMP routes learned from
that device for 10 minutes—the graceful restart timer value that is configured on the device and that the device
has sent to the vSmart controller during the setup of the OMP session. The Cisco vEdge Device retains the
routes it learns from the vSmart controller for 5 minutes, which is the default graceful restart time value that
is used on the vSmart controller and that the controller sent to the device, also during the setup of the OMP
session.
While a vSmart controller is down and a Cisco vEdge Device is using cached OMP information, if you reboot
the device, it loses its cached information and hence will not be able to forward data traffic until it is able to
establish a control plane connection to the vSmart controller.
To configure the routes that the device advertises to OMP for a specific VPNs on the device:
Device(config-vpn-omp)# advertise (aggregate prefix [aggregate-only] | bgp | connected |
network prefix | ospf type | static)
When you configure BGP to propagate AS path information, the device sends AS path information to devices
that are behind the Cisco vEdge Devices (in the service-side network) that are running BGP, and it receives
AS path information from these routers. If you are redistributing BGP routes into OMP, the AS path information
is included in the advertised BGP routes. If you configure BGP AS path propagation on some but not all
devices in the overlay network, the devices on which it is not configured receive the AS path information but
they do not forward it to the BGP routers in their local service-side network. Propagating AS path information
can help to avoid BGP routing loops.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
48
Unicast Overlay Routing
Configure OMP Using CLI
In networks that have both overlay and underlay connectivity—for example, when devices are interconnected
by both a Cisco SD-WAN overlay network and an MPLS underlay network—you can assign as AS number
to OMP itself. For devices running BGP, this overlay AS number is included in the AS path of BGP route
updates. To configure the overlay AS:
Device(config)# omp
Device(omp)# overlay-as as-number
You can specify the AS number in 2-byte ASDOT notation (1 through 65535) or in 4-byte ASDOT notation
(1.0 through 65535.65535). As a best practice, it is recommended that the overlay AS number be a unique
AS number within both the overlay and the underlay networks. That use, select an AS number that is not used
elsewhere in the network.
If you configure the same overlay AS number on multiple devices in the overlay network, all these devices
are considered to be part of the same AS, and as a result, they do not forward any routes that contain the
overlay AS number. This mechanism is an additional technique for preventing BGP routing loops in the
network.
If the limit is lower than the number of route–TLOC tuples, the Cisco vEdge Device or Cisco vSmart Controller
advertises the best routes.
The maximum number of OMP paths installed can range from 1 through 16.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
49
Unicast Overlay Routing
Configure OMP Using CLI
The keepalive timer is one-third the hold time and is not configurable.
If the local device and the peer have different hold time intervals, the higher value is used.
If you set the hold time to 0, the keepalive and hold timers on the local device and the peer are set to 0.
The hold time must be at least two times the hello tolerance interval set on the WAN tunnel interface in VPN
0. To configure the hello tolerance interface, use the hello-tolerance command.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
50
CHAPTER 4
Multicast Overlay Routing
The Cisco SD-WAN multicast overlay implementation extends native multicast by creating a secure optimized
multicast tree that runs on top of the overlay network.
The Cisco SD-WAN multicast overlay software uses Protocol Independent Multicast Sparse Mode (PIM-SM)
for multicasting traffic on the overlay network. PIM-SM builds unidirectional shared trees rooted at a rendezvous
point (RP), and each multicast group has one shared tree that is rooted at a single RP. Once a shared tree has
been built such that a last-hop router learns the IP address for the multicast source, the router engages in a
switchover from the shared tree to initiate the construction of a source (or shortest-path) tree. The source tree
uses the lowest metric path between the source and last-hop router, which may be entirely, partially, or not
at all congruent with the shared tree.
• Supported Protocols, on page 51
• Traffic Flow in Multicast Overlay Routing, on page 53
• Configure Multicast Overlay Routing, on page 56
• Multicast Routing CLI Reference, on page 64
Supported Protocols
Cisco SD-WAN overlay multicast network supports the Protocol Independent Multicast (PIM) and Internet
Group Management Protocol (IGMP).
PIM
Viptela overlay multicast supports PIM version 2 (defined in RFC 4601 ), with some restrictions.
On the service side, the Viptela software supports native multicast. A vEdge router appears as a native PIM
router and establishes PIM neighborship with other PIM routers at a local site. To properly extend multicast
trees into the overlay network, a vEdge router may require other supporting routers in a local site. If a PIM-SM
RP is required at a site, that function must be provided by a non-Viptela router, because the vEdge router
currently has no native support for the rendervouz point functionality. Receivers residing downstream of a
vEdge router can join multicast streams by exchanging IGMP membership reports directly with the device,
and no other routers are required. This applies only to sites that have no requirement for supporting local
sources or PIM SM rendezvouz points.
On the transport side, PIM-enabled vEdge routers originate multicast service routes (called multicast
autodiscover routes),sending them via OMP to the vSmart controllers. The multicast autodiscover routes
indicate whether the router has PIM enabled and whether it is a replicator. If the router is a replicator and the
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
51
Multicast Overlay Routing
PIM
load threshold has been configured, this information is also included in the multicast autodiscover routes.
Each PIM router also conveys information learned from the PIM join messages sent by local-site
multicast-enabled routers, including multicast group state, source information, and RPs. These routes assist
vEdge routers in performing optimized joins across the overlay when joining existing multicast sources.
vEdge routers support PIM source-specific mode (SSM), which allows a multicast source to be directly
connected to the router.
Rendezvous Points
The root of a PIM multicast shared tree resides on a router configured to be a rendezvous point (RP). Each
RP acts as the RP and the root of a shared tree (or trees) for specific multicast group ranges. In the Viptela
overlay network, RPs are non-Viptela routers that reside in the local-site network. The RP function is typically
assigned to one or two locations in the network; it is not required at every site. vEdge routers do not currently
support the RP functionality, so non-Viptela routers must provide this function in the applicable sites.
The Viptela software supports the auto-RP protocol for distributing RP-to-group mapping information to
local-site PIM routers. With this information, each PIM router has the ability to forward joins to the correct
RP for the group that a downstream IGMP client is attempting to join. Auto-RP updates are propagated to
downstream PIM routers if such routers are present in the local site.
Replicators
For efficient use of WAN bandwidth, strategic vEdge routers can be deployed and configured as replicators
throughout the overlay network. Replicators mitigate the requirement for an ingress router to replicate a
multicast stream once for each receiver.
As discussed above, replicators advertise themselves, via OMP multicast-autodiscover routes, to the vSmart
controllers in the overlay network. The controllers then forward the replicator location information to the
PIM-enabled vEdge routers that are in the same VPN as the replicator.
A replicator vEdge router receives streams from multicast sources, replicates them, and forwards them to
multicast receivers. The details of the replication process are discussed below, in the section Multicast Traffic
Flow through the Overlay Network.
A replicator is typically vEdge router located at a colo site or another site with a higher-speed, or a high-speed,
connection to the WAN transport network.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
52
Multicast Overlay Routing
IGMP
either the IP address of an RP if the originating router is attempting to join the shared tree or the IP address
of the actual source of the multicast stream if the originating router is attempting to join the source tree.
IGMP
Cisco SD-WAN overlay multicast routing supports the Internet Group Management Protocol (IGMP) version
2 (defined in RFC 2236 ). Cisco vEdge devices use IGMP to process receiver membership reports for the
hosts in a particular VPN and to determine, for a given group, whether multicast traffic should be forwarded
and state should be maintained. vEdge routers listen for both IGMPv1 and IGMPv2 group membership reports.
• vEdge router vEdge-3 is located at a site with two multicast sources, Source-1 and Source-2. This site
also has a non-vEdge router that functions as a PIM-SM RP. Even though the vEdge-3 router is the
ingress router for streams from these two multicast sources, it performs no packet replication. Instead,
it forwards the multicast streams to replicators in the overlay network. The vEdge-3 router has learned
the addresses of the replicators via OMP from a vSmart controller.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
53
Multicast Overlay Routing
Traffic Flow in Multicast Overlay Routing
• vEdge routers vEdge-1 and vEdge-2 are two multicast replicators in the overlay network. Their job as
replicators is to receive streams from multicast sources, replicate the streams, and then forward them to
receivers. In this topology, the vEdge-3 router forwards the multicast streams from the two multicast
sources in its local network to vEdge-1 or vEdge2, or both, and these routers then replicate and forward
the streams to the receivers located in the local sites behind vEdge routers vEdge-4 and vEdge5. Which
replicator receives a stream depends on the group address, the identity of the vEdge routers that joins
that given group, and the current load of the replicator. The typical situation is that only a single replicator
is replicating traffic for a given group, but this may vary depending on the physical scope of the given
group.
• vEdge router vEdge4 is located at a site that has one multicast receiver, Receiver-3, which receives
streams from Source-1 and Source-2.
• vEdge router vEdge5 is located at another site with one multicast receiver, Receiver-4. This receiver gets
streams only from one source, Source-1.
Now, let’s examine how multicast traffic flows from the sources to the receivers.
The two multicast sources, Source-1 and Source-2, send their multicast streams (the blue stream from Source-1
and the green stream from Source-2) to the RP. Because the destination IP addresses for both streams are at
remote sites, the RP forwards them to vEdge-3 for transmission onto the transport/WAN network. vEdge-3
has learned from the vSmart controller that the network has two replicators, vEdge-1 and vEdge-2, and so
forwards the two multicast streams to them, without first replicating the streams.
The two replicators have learned from a vSmart controller the locations of multicast receivers for the two
streams. The vEdge-1 replicator makes one copy of the green stream and forwards it to vEdge-4, which in
turns forwards it to the Receiver-3. The vEdge-2 replicator makes one copy of the green stream, which it
forwards to vEdge-5 (from which it goes on to Receiver-4), and it makes two copies of the blue stream, which
it forwarsa to vEdge-4 and vEdge-5 (and which they then forward to the two receivers).
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
54
Multicast Overlay Routing
Traffic Flow in Multicast Overlay Routing
Now, let's look at the multicast configurations on the five vEdge routers:
• vEdge router vEdge-1 is a PIM replicator for a particular VPN. If we assume that no multicast sources,
receivers, or RPs are located in its local network, the configuration of this router is simple: In the VPN,
enable the replicator functionality, with the router multicast-replicator local command, and enable
PIM, with the router pim command.
• vEdge router vEdge-2 also acts only as a replicator in the same VPN as vEdge-1, and you configure it
with the same commands, router multicast-replicator local and router pim, when configuring the
VPN. Each replicator can accept a maximum number of new PIM joins, and when this threshold value
is reached, all new joins are sent to the second replicator. (If there is only one replicator, new joins
exceeding the threshold are dropped.)
• vEdge router vEdge-4 runs PIM. You enable PIM explicitly on the service side within a VPN, specifying
the service-side interface that connects to the multicast domain in the local network. So within the VPN,
you include the router pim interface command. You can also enable auto-RP with the router pim
auto-rp command. On the transport side, no explicit configuration is required. The vEdge router
automatically directs multicast traffic—both OMP control plane messages and multicast streams—to
VPN 0, which is the WAN transport VPN.
• vEdge router vEdge-5 is also configured to run PIM in the same way as vEdge-4: You configure the
service-side interface name and RP information.
PIM must be enabled in the same VPN on all five of these vEdge routers so that the multicast streams can be
transmitted and received.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
55
Multicast Overlay Routing
Configure Multicast Overlay Routing
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
56
Multicast Overlay Routing
Configure PIM Using vManage Templates
7. Under Additional VPN Templates, located to the right of the screen, click PIM.
8. From the PIM drop-down, click Create Template. The PIM template form is displayed. The top of the
form contains fields for naming the template, and the bottom contains fields for defining PIM parameters.
9. In the Template Name field, enter a name for the template. The name can be up to 128 characters and
can contain only alphanumeric characters.
10. In the Template Description field, enter a description of the template. The description can be up to 2048
characters and can contain only alphanumeric characters.
When you first open a feature template, for each parameter that has a default value, the scope is set to Default
(indicated by a check mark), and the default setting or value is shown. To change the default or to enter a
value, click the scope drop-down to the left of the parameter field and select one of the following:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
57
Multicast Overlay Routing
Configure PIM Using vManage Templates
Table 21:
Device Specific Use a device-specific value for the parameter. For device-specific parameters, you
(indicated by a host cannot enter a value in the feature template. You enter the value when you attach a
icon) Viptela device to a device template .
When you click Device Specific, the Enter Key box opens. This box displays a key,
which is a unique string that identifies the parameter in a CSV file that you create.
This file is an Excel spreadsheet that contains one column for each key. The header
row contains the key names (one key per column), and each row after that
corresponds to a device and defines the values of the keys for that device. You
upload the CSV file when you attach a Viptela device to a device template. For
more information, see Create a Template Variables Spreadsheet .
To change the default key, type a new string and move the cursor out of the Enter
Key box.
Examples of device-specific parameters are system IP address, hostname, GPS
location, and site ID.
Global (indicated by a Enter a value for the parameter, and apply that value to all devices.
globe icon)
Examples of parameters that you might apply globally to a group of devices are
DNS server, syslog server, and interface MTUs.
Table 22:
Auto-RP Click On to enable auto-RP to enable automatic discovery of rendezvous points (RPs) in
the PIM network so that the router receivea group-to-RP mapping updates. By default,
auto-RP is disabled.
SPT Threshold Specify the traffic rate, in kbps, at which to switch from the shared tree to the shortest-path
tree (SPT). Configuring this value forces traffic to remain on the shared tree and travel
via the RP instead of via the SPT.
Replicator For a topology that includes multicast replicators, determine how the replicator for a
multicast group is chosen:
• Random—Choose the replicator at random.
• Sticky—Always use the same replicator. This is the default.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
58
Multicast Overlay Routing
Configure PIM Using CLI
Table 23:
Name Enter the name of an interface that participates in the PIM domain, in the format ge slot
/port.
Hello Interval Specify how often the interface sends PIM hello messages. Hello messages advertise that
PIM is enabled on the router.Range: 1 through 3600 secondsDefault: 30 seconds
Join/Prune Specify how often PIM multicast traffic can join or be removed from a rendezvous point
Interval tree (RPT) or shortest-path tree (SPT). vEdge routers send join and prune messages to
their upstream RPF neighbor.Range: 10 through 600 secondsDefault: 60 seconds
To edit an interface, click the pencil icon to the right of the entry.
To delete an interface, click the trash icon to the right of the entry.
To save the feature template, click Save.
Release Information
vpn-id can be any VPN number except VPN 0 (the transport VPN facing the overlay network) or VPN
512 (the management VPN).
2. Configure the interfaces in the VPN:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
59
Multicast Overlay Routing
Configure PIM Using CLI
The interface names in the two interface names must be the same.
3. Configure PIM and the interfaces that participate in the PIM network:
vEdge(config-vpn)# router pim
vEdge(config-pim)# interface interface-name
vEdge(config-interface)# no shutdown
The interface name in the two interface commands must be the same.
4. Optionally, modify PIM timers on the interface. The default PIM hello interval is 30 seconds, and the
default join/prune interval is 60 seconds.
vEdge(config-interface)# hello-interval seconds
vEdge(config-interface)# join-prune-interval seconds
The hello interval can be in the range of 1 through 3600 seconds. The join/prune interval can be in the
range of 10 through 600 seconds.
5. Optionally, enable automatic discover of rendezvous points (RPs) in the PIM network:
vEdge(config-pim)# auto-rp
vpn-id can be any VPN number except VPN 0 (reserved for control plane traffic) or VPN 512 (the
management VPN).
2. Configure PIM and the interfaces that participate in the PIM network:
vEdge(config-vpn)# router pim
vEdge(config-pim)# interface interface-name
The interface names in the two interface names must be the same.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
60
Multicast Overlay Routing
Configure PIM Using CLI
4. By default, a vEdge router joins the shortest-path tree (SPT) immediately after the first packet arrives
from a new source. To force traffic to remain on the shared tree and travel via the RP instead of via the
SPT, configure the traffic rate at which to switch from the shared tree to the SPT:
vEdge(config-vpn)# router pim spt-threshold kbps
vpn-id can be any VPN number except VPN 0 (the transport VPN facing the overlay network) or VPN
512 (the management VPN).
2. Configure the replicator functionality on the local vEdge router:
vEdge(config-vpn)# router multicast-replicator local
3. On the transport side, a single vEdge router acting as a replicator can accept a maximum of 1024 (*,G)
and (S,G) joins. For each join, the router can accept 256 tunnel outgoing interfaces (OILs). To modify
the number of joins the replicator can accept, change the value of the join threshold:
vEdge(config-router)# multicast-replicator threshold number
If the router is just a replicator and is not part of a local network that contains either multicast sources or
receivers, you do not need to configure any interfaces in the PIM portion of the configuration. The replicator
learns the locations of multicast sources and receivers from the OMP messages it exchanges with the
vSmart controller. These control plane messages are exchanged in the transport VPN (VPN 0). Similarly,
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
61
Multicast Overlay Routing
Configure IGMP Using vManage Templates
the other vEdge routers discover replicators dynamically, through OMP messages from the vSmart
controller.
7. Under Additional VPN Templates, located to the right of the screen, click IGMP.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
62
Multicast Overlay Routing
Configure IGMP Using vManage Templates
8. From the IGMP drop-down, click Create Template. The IGMP template form is displayed. The top
of the form contains fields for naming the template, and the bottom contains fields for defining IGMP
parameters.
9. In the Template Name field, enter a name for the template. The name can be up to 128 characters and
can contain only alphanumeric characters.
10. In the Template Description field, enter a description of the template. The description can be up to 2048
characters and can contain only alphanumeric characters.
When you first open a feature template, for each parameter that has a default value, the scope is set to Default
(indicated by a check mark), and the default setting or value is shown. To change the default or to enter a
value, click the scope drop-down to the left of the parameter field and select one of the following:
Table 24:
Device Specific Use a device-specific value for the parameter. For device-specific parameters, you
(indicated by a host cannot enter a value in the feature template. You enter the value when you attach a
icon) Viptela device to a device template .
When you click Device Specific, the Enter Key box opens. This box displays a key,
which is a unique string that identifies the parameter in a CSV file that you create.
This file is an Excel spreadsheet that contains one column for each key. The header
row contains the key names (one key per column), and each row after that
corresponds to a device and defines the values of the keys for that device. You
upload the CSV file when you attach a Viptela device to a device template. For
more information, see Create a Template Variables Spreadsheet .
To change the default key, type a new string and move the cursor out of the Enter
Key box.
Examples of device-specific parameters are system IP address, hostname, GPS
location, and site ID.
Global (indicated by a Enter a value for the parameter, and apply that value to all devices.
globe icon)
Examples of parameters that you might apply globally to a group of devices are
DNS server, syslog server, and interface MTUs.
Table 25:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
63
Multicast Overlay Routing
Configure IGMP Using CLI
Interface Name Enter the name of the interface to use for IGMP.
To add another interface, click the plus sign (+). To delete an interface, click the trash
icon to the right of the entry.
Join Group Click Add Join Group Address, and enter the address of a multicast group for the interface
Address to join.
Click Add to add the new interface
Ensure that the interface being used for IGMP is configured in the VPN:
vEdge(config)# vpn vpn-id
vEdge(config-vpn)# interface interface-name
vEdge(config-interface)# ip address prefix/length
vEdge(config-interface)# no shutdown
This systemwide configuration applies to all multicast-enabled interfaces on the vEdge router.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
64
Multicast Overlay Routing
Multicast Routing CLI Reference
vpn vpn-id
router
igmp
interface interface-name
join-group group-address
[no] shutdown
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
65
Multicast Overlay Routing
Multicast Routing CLI Reference
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
66
CHAPTER 5
Segmentation
Network segmentation has existed for over a decade and has been implemented in multiple forms and shapes.
At its most rudimentary level, segmentation provides traffic isolation. The most common forms of network
segmentation are virtual LANs, or VLANs, for Layer 2 solutions, and virtual routing and forwarding, or VRF,
for Layer 3 solutions.
There are many use cases for segmentation:
Limitations of Segmentation
One inherent limitation of segmentation is its scope. Segmentation solutions either are complex or are limited
to a single device or pair of devices connected via an interface. As an example, Layer 3 segmentation provides
the following:
1. Ability to group prefixes into a unique route table (RIB or FIB).
2. Ability to associate an interface with a route table so that traffic traversing the interface is routed based
on prefixes in that route table.
This is a useful functionality, but its scope is limited to a single device. To extend the functionality throughout
the network, the segmentation information needs to be carried to the relevant points in the network.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
67
Segmentation
Segmentation in Cisco SD-WAN
The first approach is useful if every device is an entry or exit point for the segment, which is generally not
the case in medium and large networks. The second approach is much more scalable and keeps the transport
network free of segments and complexity. MPLS-based Layer 3 VPNs are a popular example of segmentation
at the edge.
• Segmentation in Cisco SD-WAN, on page 68
• VPNs Used in Cisco SD-WAN Segmentation, on page 70
• Configure VPNs Using vManage Templates, on page 71
• Configure Segmentation Using CLI, on page 78
• Use Case: Exchange Data Traffic within a Single Private WAN, on page 91
• Use Case: Exchange Data Traffic between Two Private WANs, on page 94
• Segmentation CLI Reference, on page 95
In this figure:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
68
Segmentation
Segmentation in Cisco SD-WAN
Because each router has an OMP connection over a TLS tunnel to a vSmart controller, it propagates its routing
information to the vSmart controller. On the vSmart controller, the network administrator can enforce policies
to drop routes, to change TLOCs (which are overlay next hops) for traffic engineering or service chaining, or
to change the VPN ID (see Policy Overview for more details). The network administrator can apply these
policies as inbound and outbound policies on the vSmart controller.
All prefixes belonging to a single VPN are kept in a separate route table. This provides the Layer 3 isolation
required for the various segments in the network. So, Router-1 has two VPN route tables, and Router-2 and
Router-3 each have one route table. In addition, the vSmart controller maintains the VPN context of each
prefix.
Separate route tables provide isolation on a single node. So now the question is how to propagate the routing
information across the network.
In the Cisco SD-WAN solution, this is done using VPN identifiers, as shown in the figure below. AVPN ID
carried in the packet identifies each VPN on a link. When you configure a VPN on a Router, the VPN has a
label associated with it. The Router sends the label, along with the VPN ID, to the vSmart controller. The
vSmart controller propagates this Router-to-VPN -ID mapping information to the other Routers in the domain.
The remote Routers then use this label to send traffic to the appropriate VPN . The local Routers, on receiving
the data with the VPN ID label, use the label to demultiplex the data traffic. This is similar to how MPLS
labels are used. This design is based on standard RFCs and is compliant with regulatory procedures (such as
PCI and HIPAA).
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
69
Segmentation
VPNs Used in Cisco SD-WAN Segmentation
It is important to point out that the transport network that connects the routers is completely unaware of the
VPNs . Only the routers know about VPNs ; the rest of the network follows standard IP routing.
Transport VPNs
VPN 0 is the transport VPN. To enforce the inherent separation between services (such as prefixes that belong
to the enterprise) and transport (the network that connects the vEdge routers), all the transport interfaces (that
is, all the TLOCs) are kept in the transport VPN. This ensures that the transport network cannot reach the
service network by default. Multiple transport interfaces can belong to the same transport VPN, and packets
can be forwarded to and from transport interfaces. VPN 0 or transport VPN carries control traffic over secure
DTLS or TLS connections between vSmart controllers and vEdge routers, and between vSmart controllers
and vBond orchestrators
VPN 0 contains all interfaces for a device except for the management interface, and all the interfaces are
disabled. For the control plane to establish itself so that the overlay network can function, you must configure
WAN transport interfaces in VPN 0. On vEdge routers, the interfaces in VPN 0 connect to some type of
transport network or cloud, such as the Internet, MPLS, or Metro Ethernet. For each interface in VPN 0, you
must set an IP address, and you create a tunnel connection that sets the color and encapsulation for the WAN
transport connection. (The encapsulation is used for the transmission of data traffic.) These three parameters—IP
address, color, and encapsulation—define a TLOC (transport location) on the vEdge router. The OMP session
running on each tunnel sends the TLOC to the vSmart controllers so that they can learn the overlay network
topology. For VPN 0, you can also set other interface-specific and VPN-specific properties in VPN 0.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
70
Segmentation
Configure VPNs Using vManage Templates
Management VPNs
VPN 512 is the management VPN. It carries out-of-band network management traffic among the Cisco
SD-WAN devices in the overlay network. By default, VPN 512 is configured and enabled. You can modify
this configuration if desired.
Service VPNs
To segment user networks and user data traffic locally at each site and to interconnect user sites across the
overlay network, you create additional VPNs on Cisco vEdge devices. These VPNs are identified by a number
that is not 0 or 512. To enable the flow of data traffic, you associate interfaces with each VPN, assigning an
IP address to each interface. These interfaces connect to local-site networks, not to WAN transport clouds.
For each of these VPNs, you can set other interface-specific properties, and you can configure features specific
for the user segment, such as BGP and OSPF routing, VRRP, QoS, traffic shaping, and policing.
Step 6 To create a template for VPNs 1 through 511, and 513 through 65530:
a. Click the Service VPN tab located directly beneath the Description field, or scroll to the Service VPN section.
b. Click the Service VPN drop-down.
c. From the VPN drop-down, click Create Template. The VPN template form displays. The top of the form contains
fields for naming the template, and the bottom contains fields for defining VPN parameters.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
71
Segmentation
Configure Basic VPN Parameters
Step 7 In the Template Name field, enter a name for the template. The name can be up to 128 characters and can contain only
alphanumeric characters.
Step 8 In the Template Description field, enter a description of the template. The description can be up to 2048 characters and
can contain only alphanumeric characters.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
72
Segmentation
Configure Basic Interface Functionality
Note To complete the configuration of the transport VPN on a router, you must configure at least one interface in
VPN 0.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
73
Segmentation
Create a Tunnel Interface
CLI Equivalent
vpn vpn-id
interface interface-name
bandwidth-downstream kbps
bandwidth-upstream kbps
block-non-source-ip
description text
dhcp-helper ip-address
(ip address ipv4-prefix/length| ip dhcp-client [dhcp-distance number])
(ipv6 address ipv6-prefix/length | ipv6 dhcp-client [dhcp-distance number]
[dhcp-rapid-commit])
secondary-address ipv4-address
[no] shutdown
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
74
Segmentation
Create a Tunnel Interface
Control Connection Yes If the Cisco vEdge device has multiple TLOCs, click No to have the tunnel
not establish a TLOC. The default is On, which establishes a control
connection for the TLOC.
Maximum Control Yes Specify the maximum number of Cisco vSmart Controllers that the WAN
Connections tunnel interface can connect to. To have the tunnel establish no control
connections, set the number to 0.
Range: 0 through 8
Default: 2
Cisco vBond Yes Click On to enable Session Traversal Utilities for NAT (STUN) to allow
Orchestrator As Stun the tunnel interface to discover its public IP address and port number when
Server theCisco vEdge device router is located behind a NAT.
Exclude Controller Yes Set the Cisco vSmart Controllers that the tunnel interface is not allowed
Group List to connect to.
Range: 0 through 100
vManage Connection Yes Set the preference for using a tunnel interface to exchange control traffic
Preference with the vManage NMS.
Range: 0 through 8
Default: 5
Port Hop No Click On to enable port hopping, or click Off to disable it. If port hopping
is enabled globally, you can disable it on an individual TLOC (tunnel
interface). To control port hopping on a global level, use the System
configuration template.
Default: Enabled
vManage NMS and Cisco vSmart Controller default: Disabled
Low-Bandwidth Link Yes Select to characterize the tunnel interface as a low-bandwidth link.
Allow Service No Select On or Off for each service to allow or disallow the service on the
interface.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
75
Segmentation
Create a Tunnel Interface
IPsec Yes Use IPsec encapsulation on the tunnel interface. By default, IPsec is
enabled.
If you select both IPsec and GRE encapsulations, two TLOCs are created
for the tunnel interface that have the same IP addresses and colors, but that
differ by their encapsulation.
IPsec Preference Yes Specify a preference value for directing traffic to the tunnel. A higher value
is preferred over a lower value.
Range: 0 through 4294967295
Default: 0
IPsec Weight Yes Enter a weight to use to balance traffic across multiple TLOCs. A higher
value sends more traffic to the tunnel.
Range: 1 through 255
Default: 1
Carrier No Select the carrier name or private network identifier to associate with the
tunnel.
Values: carrier1, carrier2, carrier3, carrier4, carrier5, carrier6, carrier7,
carrier8, default
Default: default
Bind Loopback Yes Enter the name of a physical interface to bind to a loopback interface.
Tunnel
Last-Resort Circuit Yes Select to use the tunnel interface as the circuit of last resort.
NAT Refresh No Enter the interval between NAT refresh packets sent on a DTLS or TLS
Interval WAN transport connection.
Range: 1 through 60 seconds
Default: 5 seconds
Hello Interval No Enter the interval between Hello packets sent on a DTLS or TLS WAN
transport connection.
Range: 100 through 10000 milliseconds
Default: 1000 milliseconds (1 second)
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
76
Segmentation
Configure DNS and Static Hostname Mapping
CLI Equivalent
vpn vpn-id
dns ip-address (primary | secondary)
host hostname ip ip-address
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
77
Segmentation
Configure Segmentation Using CLI
In the most common cases, interface-name is the name of a physical Gigabit Ethernet interface (ge port
/ slot). The interface name can also be gre number, ipsec number, loopback string, natpool number,
or ppp number.
2. Configure a static IPv4 address for the interface:
vEdge(config-interface)# ip address prefix/length
vEdge(config-interface) #
Or you can enable DHCP on the interface so that the interface learn its IP address dynamically:
vEdge(config-interface)# ip dhcp-client [dhcp-distance number]
vEdge(config-interface)#
When an interface learns its IPv4 address from a DHCP server, it can also learn routes from the server.
By default, these routes have an administrative distance of 1, which is the same as static routes. To
change the default value, include the dhcp-distance option, specifying a distance from 1 through 255.
3. To enable dual stack, configure a static IPv6 address for the interface:
vEdge(config-interface)# ipv6 address prefix/length
vEdge(config-interface)#
Or you can enable DHCPv6 on the interface so that the interface learn its IP address dynamically:
vEdge(config-interface)# ipv6 dhcp-client [dhcp-distance number] [dhcp-rapid-commit]
vEdge(config-interface)#
When an interface learns its IPv6 address from a DHCPv6 server, it can also learn routes from the server.
By default, these routes have an administrative distance of 1, which is the same as static routes. To
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
78
Segmentation
Configure VPNs Using CLI
change the default value, include the dhcp-distance option, specifying a distance from 1 through 255.
To speed up the assignment of IPv6 addresses, include the dhcp-rapid-commit option.
4. Enable the interface:
vEdge(config-interface)# no shutdown
6. Configure a color for the tunnel connection as an identifier for the tunnel:
vEdge(config-tunnel-interface)# color color
vEdge(config-tunnel-interface)#
color can be 3g, biz-internet, blue, bronze, custom1, custom2, custom3, default, gold, green, lte,
metro-ethernet, mpls, private1 through private6, public-internet, red, and silver. The default color
is default. The colors metro-ethernet, mpls, and private1 through private6 are referred to as private
colors, because they use private addresses to connect to the remote side vEdge router in a private network.
You can use these colors in a public network provided that there is no NAT device between the local
and remote vEdge routers.
7. Configure the encapsulation to use on tunnel connection:
vEdge(config-tunnel-interface)# encapsulation (gre | ipsec)
vEdge(config-tunnel-interface)#
To configure both IPsec and GRE encapsulation, include two encapsulation commands. Note that if
you do this, you are creating two TLOCs that have the same IP addresses and colors, but that have
different encapsulation.
8. Configure any other properties specific to the tunnel interface, the interface, or VPN 0.
9. If you have a multi-TLOC environment, configure additional tunnel interfaces.
10. Enable DNS service in the VPN by configuring the IP address of a DNS server reachable from VPN 0:
vEdge(config-vpn-0)# dns ip-address (primary | secondary)
The address can be either an IPv4 or IPv6 address. By default, the IP address is for the primary DNS
server.
11. If desired, configure IPv4 and IPv6 static routes in VPN 0:
vEdge(config-vpn-0)# ip route prefix/length next-hop [administrative-distance]
vEdge(config-vpn-0)# ipv6 route prefix/length next-hop [administrative-distance]
To display interface information, use the show interface command for IPv4 interfaces and show ipv6 interfaces
for IPv6 interfaces. To display information about DHCP and DHCPv6 servers, use the show dhcp interface
and show ipv6 dhcp interface commands.
When you are troubleshooting routing and forwarding problems on a vEdge router, you can configure the
router to perform route consistency checks, to determine whether the routes in the router's route and forwarding
tables are consistent:
vEdge(config-system)#route-consistency-check
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
79
Segmentation
Configure VPNs Using CLI
This command checks only IPv4 routes. Route consistency checking requires a large amount of device CPU,
so it is recommended that you enable it only when you trouble shooting an issue and that you disable it at
other times.
Here is an example of a VPN 0 configuration, where interface ge0/0 is the WAN transport interface. This
example shows that dual stack is enabled on the router, because the tunnel interface has both an IPv4 and an
IPv6 address. Notice that the remaining seven device interfaces are part of VPN 0, because we have not yet
configured any other VPNs. Also notice that the management interface is not present in VPN 0.
vpn 0
interface ge0/0
ip address 10.0.0.8/24
ipv6 address fd00:1234::/16
tunnel-interface
color biz-internet
encapslation ipsec
allow-service dhcp
allow-service dns
allow-service icmp
no allow-service sshd
no allow-service ntp
no allow-service stun
!
no shutdown
!
interface ge0/1
shutdown
!
interface ge0/2
shutdown
!
interface ge0/3
shutdown
!
interface ge0/4
shutdown
!
interface ge0/5
shutdown
!
interface ge0/6
shutdown
!
interface ge0/7
shutdown
!
!
An interface can participate only in one VPN. So in an initial configuration, when VPN 0 is the only VPN
that is configured, all the device's interfaces are present, by default, in VPN 0 (as shown in the output above).
Then, when you create other VPNs to carry data traffic and configure interfaces in those VPNs, the interfaces
used in the other VPNs are automatically removed from VPN 0. Here is an example in which interface ge0/3
is used for VPN 1, so it has been automatically removed from the configuration of VPN 0:
vpn 0
interface ge0/0
ip address 10.0.0.8/24
tunnel-interface
color biz-internet
encapsulation ipsec
allow-service dhcp
allow-service dns
allow-service icmp
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
80
Segmentation
Configure VPNs Using CLI
no allow-service sshd
no allow-service ntp
no allow-service stun
!
no shutdown
!
interface ge0/1
shutdown
!
interface ge0/2
shutdown
!
interface ge0/4
shutdown
!
interface ge0/5
shutdown
!
interface ge0/6
shutdown
!
interface ge0/7
shutdown
!
!
vpn 1
router
ospf
redistribute omp route-policy test-policy
area 0
interface ge0/3
exit
exit
!
!
interface ge0/3
ip address 10.10.10.1/24
no shutdown
!
!
When you configure subinterfaces in a VPN that carries data traffic (that is, not VPN 0 and not VPN 512),
the main interface must be configured with the no shutdown command so that it is enabled, and the main
interface remains in VPN 0 once you configure the subinterface. For example, if in the VPN 1 configuration,
you were to configure OSPF on VLAN 1, you can see that interface ge0/3 remains present in VPN 0, while
the subinterface interface ge0/3.1 is used in VPN1:
vpn 0
dns 1.2.3.4 primary
interface ge0/0
address 10.0.0.8/24
tunnel-interface
preference 100
allow-service dhcp
allow-service dns
allow-service icmp
allow-service sshd
allow-service ntp
allow-service stun
!
no shutdown
!
interface ge0/1
shutdown
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
81
Segmentation
Configure VPNs Using CLI
!
interface ge0/2
shutdown
!
interface ge0/3
no shutdown
!
interface ge0/4
shutdown
!
interface ge0/5
shutdown
!
interface ge0/6
shutdown
!
interface ge0/7
shutdown
!
!
vpn 1
router
ospf
redistribute omp route-policy test-policy
area 0
interface ge0/3.1
exit
exit
!
!
interface ge0/3.1
ip address 10.10.10.1/24
no shutdown
!
!
Or you can enable DHCP on the interface so that the interface learn its IP address dynamically:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
82
Segmentation
Configure VPNs Using CLI
When an interface learns its IPv4 address from a DHCP server, it can also learn routes from the server.
By default, these routes have an administrative distance of 1, which is the same as static routes. To change
the default value, include the dhcp-distance option, specifying a distance from 1 through 255.
3. To enable dual stack, configure a static Pv6 address for the interface:
vSmart(config-interface)# ipv6 address prefix/length
vSmart(config-interface)#
Or you can enable DHCPv6 on the interface so that the interface learn its IP address dynamically:
vSmart(config-interface)# ipv6 dhcp-client [dhcp-distance number] [dhcp-rapid-commit]
vSmart(config-interface)#
When an interface learns its IPv6 address from a DHCPv6 server, it can also learn routes from the server.
By default, these routes have an administrative distance of 1, which is the same as static routes. To change
the default value, include the dhcp-distance option, specifying a distance from 1 through 255. To speed
up the assignment of IPv6 addresses, include the dhcp-rapid-commit option.
4. Enable the interface:
vSmart(config-interface)# no shutdown
5. Enable DNS service in the VPN by configuring the IP address of a DNS server reachable from VPN 0:
vSmart(config-vpn-0)# dns ip-address (primary | secondary)
The address can be either an IPv4 or IPv6 address. By default, the IP address is for the primary DNS
server.
6. If desired, configure IPv4 and IPv6 static routes in VPN 0:
vSmart(config-vpn-0)# ip route prefix/length next-hop [administrative-distance]
vSmart(config-vpn-0)# ipv6 route prefix/length next-hop [administrative-distance]
7. Configure any other properties specific to the tunnel interface, the interface, or VPN 0.
8. Activate the configuration:
vSmart(config)# commit
To display interface information, use the show interface command for IPv4 interfaces and show ipv6 interfaces
for IPv6 interfaces. To display information about DHCP and DHCPv6 servers, use the show dhcp interface
and show ipv6 dhcp interface commands.
Here is an example of a VPN 0 configuration on a vSmart controller:
vSmart# show running-config vpn 0
vpn 0
dns 1.2.3.4 primary
interface eth0
ip dhcp-client
no shutdown
!
interface eth1
ip address 10.0.5.19/24
tunnel-interface
allow-ssh
allow-icmp
!
no shutdown
!
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
83
Segmentation
Configure VPNs Using CLI
3. Set the color of the loopback interface to be one of the primatel colors—metro-ethernet, mpls, and
private1 through private6. You must configure this same color on the loopback interfaces of all vEdge
routers in the same private LAN.
vEdge(config-tunnel-interface)# color color
Use the show interface command to check that the loopback interface in configured properly, as a transport
interface with the proper IP address and color.
If a single vEdge router is connected to two (or more) different private networks, create a loopback interface
for each private network, associate a carrier name with the interface so that the router can distinguish between
the two private WANs, and "bind" the loopback interface to the physical interface that connects to the
appropriate private WAN:
1. Configure the loopback interface, assigning it an IP address:
vEdge(config)# vpn 0
loopback
number
ip address prefix/length
vEdge(config-loopback)# no shutdown
2. Configure the loopback interface to be a transport interface and bind it to a physical interface:
vEdge(config-loopback)# tunnel-interface bind
ge
slot/port
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
84
Segmentation
Configure VPNs Using CLI
VPN 512 must be present on all Cisco SD-WAN devices so that they are always reachable on the network.
You can configure additional parameters for VPN 512 if you choose.
The VPN number can be in the range 1 through 511, and 513 through 65535.
2. Configure at least one interface in the VPN and its IP address:
vEdge(config-vpn)# interface
interface-name
ip address
address/prefix
vEdge(config-interface)#
The interface name has the format ge slot/port, where the slot is generally 0 through 7 (depending on the
device) and the port is 0 through 8. If you are configuring VLANs, specify a subinterface name in the
format ge slot/port . vlan, where the VLAN number can be in the range 1 through 4094. (VLAN numbers
0 and 4095 are reserved.) The interface name can also be gre number, ipsec number, loopback
string, natpool number, or ppp number.
3. Activate the interface:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
85
Segmentation
Segmentation (VPNs ) Configuration Examples
vEdge(config-interface)# no shutdown
4. Enable DNS service in the VPN by configuring the IP address of a DNS server reachable from that VPN:
vEdge(config-vpn)# dns ip-address
Dual-Stack Operation
When a Cisco SD-WAN device establishes an IPsec tunnel for control traffic between a local TLOC and a
remote TLOC, or when a device establishes a BFD tunnel for data plane traffic between a local and a remote
TLOC, an IPv6 tunnel is established in the following situations:
• The local device has only an IPv6 address, and the remote device has an IPv6 address.
• The remote device has only an IPv6 address, and the local device has an IPv6 address.
If both the local and remote devices have IPv4 addresses, IPsec and BFD always establish an IPv4 tunnel.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
86
Segmentation
Segmentation (VPNs ) Configuration Examples
• Create a VPN instance for the transport VPN. VPN 0 is reserved for the transport VPN.
• Create a VPN instance for the management VPN. VPN 512 is reserved for the management VPN.
• Create a VPN instance to use for routing.
2. In VPN 0, which is the transport VPN, configure the interface to the WAN transport cloud, to establish
reachability between the vEdge router and the vSmart controller, and between vEdge routers:
a. Configure an IP address for the interface:
vEdge(config-interface)# vpn 0 interface interface-name ip address prefix/length
c. Enable a transport tunnel interface to carry control and data traffic, and configure the color and
encapsulation for the tunnel:
vEdge(config-interface)# tunnel-interface
vEdge(config-tunnel-interface)# encapsulation (gre | ipsec)
vEdge(config-tunnel-interface)# color color
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
87
Segmentation
Segmentation (VPNs ) Configuration Examples
4. Configure unixAR routing in the VPN. See Configuring Basic Unicast Overlay Routing for more
information.
5. Activate the configuration:
vEdge(config)# commit
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
88
Segmentation
Segmentation (VPNs ) Configuration Examples
2. Create a prefix list for the prefixes that you do not want to propagate:
vSmart(config)# policy lists prefix-list drop-list ip-prefix 10.200.1.0/24
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
89
Segmentation
Segmentation (VPNs ) Configuration Examples
You control VPN membership policy at the vSmart controller. In the example here, you create a policy that
explicitly disallows VPN 1 at sites 20 and 30:
apply-policy
site-list 20-30
vpn-membership disallow-vpn1
!
!
policy
lists
site-list 20-30
site-id 20
site-id 30
!
!
vpn-membership disallow-vpn1
sequence 10
match vpn-id 1
action reject
!
!
default-action accept
!
!
policy
lists
site-list BP-Sites
site-id 10
site-id 20
vpn-list All-BPs
vpn 100
vpn 101
vpn-list Enterprise-BP
vpn 200
control-policy import-BPs-to-Enterprise
sequence 10
match route
vpn-list All-BPs
!
action accept
export-to vpn-list Enterprise-BP
!
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
90
Segmentation
Use Case: Exchange Data Traffic within a Single Private WAN
!
!
default-action accept
!
!
apply-policy
site-list BP-Sites
control-policy import-BPs-to-Enterprise in
!
This policy matches all routes from all VPNs in the All-BPs VPN lists and populates these prefixes into the
VPNs in the Enterprise-BP list. The routing table of the Enterprise-BP VPN will now contain all the prefixes
of the BPs.
One advantage of importing routes in this way is access control. Keeping each BP in a separate VPN and
creating an extranet policy ensures that the BPs cannot talk to each other.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
91
Segmentation
Use Case: Exchange Data Traffic within a Single Private WAN
This topology requires a special configuration to allow traffic exchange using private IP addresses because:
• The vEdge routers are in different sites; that is, they are configured with different site IDs.
• The vEdge routers are directly connected to the PE routers in the carrier's MPLS cloud.
• The MPLS carrier does not advertise the link between the vEdge router and its PE router.
To be clear, if the situation were one of the following, no special configuration would be required:
• vEdge-1 and vEdge-2 are configured with the same site ID.
• vEdge-1 and vEdge-2 are in different sites, and the vEdge router connects to a CE router that, in turn,
connects to the MPLS cloud.
• vEdge-1 and vEdge-2 are in different sites, the vEdge router connects to the PE router in the MPLS
cloud, and the private network carrier advertises the link between the vEdge router and the PE router in
the MPLS cloud.
• vEdge-1 and vEdge-2 are in different sites, and you want them to communicate using their public IP
addresses.
In this topology, because the MPLS carrier does not advertise the link between the vEdge router and the PE
router, you use a loopback interface on the each vEdge router to handle the data traffic instead of using the
physical interface that connects to the WAN. Even though the loopback interface is a virtual interface, when
you configure it on the vEdge router, it is treated like a physical interface: the loopback interface is a terminus
for both a DTLS tunnel connection and an IPsec tunnel connection, and a TLOC is created for it.
This loopback interface acts as a transport interface, so you must configure it in VPN 0.
For the vEdge-1 and vEdge-2 routers to be able to communicate using their private IP addresses over the
MPLS cloud, you set the color of their loopback interfaces to be the same and to one of private
colors—metro-ethernet, mpls, and private1 through private6.
Here is the configuration on vEdge-1:
vedge-1(config)# vpn 0
vedge-1(config-vpn-0)# interface loopback1
vedge-1(config-interface-loopback1)# ip address 172.16.255.25/32
vedge-1(config-interface-loopback1)# tunnel-interface
vedge-1(config-tunnel-interface)# color mpls
vedge-1(config-interface-tunnel-interface)# exit
vedge-1(config-tunnel-interface)# no shutdown
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
92
Segmentation
Use Case: Exchange Data Traffic within a Single Private WAN
On vEdge-2, you configure a loopback interface with the same tunnel interface color that you used for vEdge-1:
vedge-2# show running-config vpn 0
vpn 0
interface loopback2
ip address 172. 17.255.26/32
tunnel-interface
color mpls
no shutdown
!
Use the show interface command to verify that the loopback interface is up and running. The output shows
that the loopback interface is operating as a transport interface, so this is how you know that it is sending and
receiving data traffic over the private network.
vedge-1# show interface
IF IF TCP
ADMIN OPER ENCAP SPEED MSS RX TX
VPN INTERFACE IP ADDRESS STATUS STATUS TYPE PORT TYPE MTU HWADDR MBPS DUPLEX ADJUST UPTIME PACKETS PACKETS
--------------------------------------------------------------------------------------------------------------------------------------------------
0 ge0/0 10.1.15.15/24 Up Up null transport 1500 00:0c:29:7d:1e:fe 10 full 0 0:07:38:49 213199 243908
0 ge0/1 10.1.17.15/24 Up Up null service 1500 00:0c:29:7d:1e:08 10 full 0 0:07:38:49 197 3
0 ge0/2 - Down Down null service 1500 00:0c:29:7d:1e:12 - - 0 - 1 1
0 ge0/3 10.0.20.15/24 Up Up null service 1500 00:0c:29:7d:1e:1c 10 full 0 0:07:38:49 221 27
0 ge0/6 57.0.1.15/24 Up Up null service 1500 00:0c:29:7d:1e:3a 10 full 0 0:07:38:49 196 3
0 ge0/7 10.0.100.15/24 Up Up null service 1500 00:0c:29:7d:1e:44 10 full 0 0:07:44:47 783 497
0 loopback1 172.16.255.25/32 Up Up null transport 1500 00:00:00:00:00:00 10 full 0 0:00:00:20 0 0
0 system 172.16.255.15/32 Up Up null loopback 1500 00:00:00:00:00:00 10 full 0 0:07:38:25 0 0
1 ge0/4 10.20.24.15/24 Up Up null service 1500 00:0c:29:7d:1e:26 10 full 0 0:07:38:46 27594 27405
1 ge0/5 56.0.1.15/24 Up Up null service 1500 00:0c:29:7d:1e:30 10 full 0 0:07:38:46 196 2
512 eth0 10.0.1.15/24 Up Up null service 1500 00:50:56:00:01:05 1000 full 0 0:07:45:55 15053 10333
To allow vEdge routers at different overlay network sites on the private network to exchange data traffic
directly, you use a loopback interface on the each vEdge router to handle the data traffic instead of using the
physical interface that connects to the WAN. You associate the same tag, called a carrier tag, with each
loopback interface so that all the routers learn that they are on the same private WAN. Because the loopback
interfaces are advertised across the overlay network, the vEdge routers are able to learn reachability information,
and they can exchange data traffic over the private network. To allow the data traffic to actually be transmitted
out the WAN interface, you bind the loopback interface to a physical WAN interface, specifically to the
interface that connects to the private network. Remember that this is the interface that the private network
does not advertise. However, it is still capable of transmitting data traffic.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
93
Segmentation
Use Case: Exchange Data Traffic between Two Private WANs
As in the previous example, you create loopback interfaces on the three routers. For vEdge-1, which connects
to both of the private WANs, you create two loopback interfaces. For each one, you assign a color, as in the
previous example. But you configure two more things: you assign a tag to identify the carrier, and you "bind"
the loopback interface to the physical interface that connects to the private WAN. So, vEdge-1 has two loopback
interfaces with these properties:
• Loopback1 has the color mpls, the carrier carrier2, and binds to physical interface ge0/1.
• Loopback 2 has the color metro-ethernet and the carrier carrier1, and binds to physical interface ge0/0.
The vEdge-2 router has a single loopback interface that connects to the MPLS private WAN. Its color is mpls,
and its carrier is carrier2. Both these properties match those on the loopback1 interface on vEdge-1. However,
because vEdge-2 connects to only one private WAN, there is no need to bind its loopback interface to a
physical interface.
Finally, vEdge-3 has a single loopback interface with color metro-ethernet and carrier carrier1, matching
the properties configured on the vEdge-1 loopback2 interface.
On vEdge-1, the configuration in VPN 0 looks like this:
vpn 0
interface ge0/0
ip address 10.1.15.15/24
no shutdown
!
interface loopback2
ip address 172.16.15.15/24
tunnel-interface
color metro-ethernet
carrier carrier1
bind ge0/0
!
no shutdown
!
interface ge0/1
ip address 10.1.17.15/24
no shutdown
!
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
94
Segmentation
Segmentation CLI Reference
interface loopback1
ip address 172.16.17.15/24
tunnel-interface
color mpls
carrier carrier2
bind ge0/1
!
no shutdown
!
If you need to apply control policy to a particular private network, use the match carrier option when creating
the control policy.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
95
Segmentation
Segmentation CLI Reference
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
96
CHAPTER 6
Forwarding and QoS
Forwarding is the transmitting of data packets from one router to another.
Quality of Service (QoS) is synonymous with class of service (CoS). You can enable QoS with localized data
policies, which control the flow of data traffic into and out of the interfaces of Cisco vEdge devices and Cisco
XE SD-WAN devices.
• Cisco SD-WAN Forwarding and QoS Overview, on page 97
• Traffic Behavior With and Without QoS, on page 98
• How QoS Works, on page 100
• QoS vManage, on page 101
• Forwarding and QoS Configuration Examples, on page 101
• Reference: Forwarding and QoS CLI Commands, on page 107
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
97
Forwarding and QoS
Traffic Behavior With and Without QoS
Let's follow the process that occurs when a data packet is transmitted from one site to another when no data
policy of any type is configured:
• A data packet arriving from the local service-side network and destined for the remote service-side
network comes to the router-1. The packet has a source IP address and a destination IP address.
• The router looks up the outbound SA in its VPN route table, and the packet is encrypted with SA and
gets the local TLOC. (The router previously received its SA from the vSmart controller. There is one
SA per TLOC. More specifically, each TLOC has two SAs, an outbound SA for encryption and an
inbound SA for decryption.)
• ESP adds an IPsec tunnel header to the packet.
• An outer header is added to the packet. At this point, the packet header has these contents: TLOC source
address, TLOC destination address, ESP header, destination IP address, and source IP address.
• The router checks the local route table to determine which interface the packet should use to reach its
destination.
• The data packet is sent out on the specified interface, onto the network, to its destination. At this point,
the packet is being transported within an IPsec connection.
• When the packet is received by the router on the remote service-side network, the TLOC source address
and TLOC destination address header fields are removed, and the inbound SA is used to decrypt the
packet.
• The remote router looks up the destination IP address in its VPN route table to determine the interface
to use to reach to the service-side destination.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
98
Forwarding and QoS
Traffic Behavior With and Without QoS
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
99
Forwarding and QoS
How QoS Works
1 Define class map to classify packets, by importance, into appropriate forwarding classes. class-map
Reference the class map in an access list.
2 Define policer to specify the rate at which traffic is sent on the interface. Reference the policer
policer in an access list. Apply the access list on an inbound interface.
3 The router checks the local route table to determine which interface the packet should N/A
use to reach its destination.
4 Define policer and reference the policer in an access list. Apply the access list on an policer
outbound interface.
5 Define QoS map to define the priority of data packets. Apply the QoS map on the outbound qos-map
interface.
6 Define rewrite-rule to overwrite the DSCP field of the outer IP header. Apply the rewrite-rule
rewrite-rule on the outbound interface.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
100
Forwarding and QoS
QoS vManage
On Cisco vEdge devices and Cisco XE SD-WAN devices, each interface has eight queues, which are numbered
0 to 7. Queue 0 is reserved, and is used for both control traffic and low-latency queuing (LLQ) traffic. For
LLQ, any class that is mapped to queue 0 must also be configured to use LLQ. Queues 1 to 7 are available
for data traffic, and the default scheduling for these seven queues is weighted round-robin (WRR). For these
queues, you can define the weighting according to the needs of your network. When QoS is not configured
for data traffic, queue 2 is the default queue.
Shaping Rate
You can configure shaping to control the maximum rate of traffic sent. You can configure the aggregate traffic
rate on an interface to be less than the line rate so that the interface transmits less traffic than it is capable of
transmitting. You can apply shaping to outbound interface traffic.
QoS vManage
Any type of change in configuration will cause the QoS policy to be removed and added to an interface. As
a result, there will be a sharp fall to 0 in the QoS monitor chart. The statistics depicted on the QoS monitoring
chart for the configuration change time interval can be disregarded.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
101
Forwarding and QoS
Map Each Forwarding Class to Output Queue
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
102
Forwarding and QoS
Group QoS Schedulers into a QoS Map
bandwidth-percent 10
buffer-percent 10
drops red-drop
!
Note The sum of bandwidth-percent for qos-scheduler configured under the QoS map should not exceed 100.
The sum of buffer-percent for qos-scheduler configured under the QoS map should not exceed 100.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
103
Forwarding and QoS
Apply Access Lists
class af3
!
!
sequence 4
match
destination-port 23
!
action accept
class af2
!
!
default-action drop
!
!
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
104
Forwarding and QoS
Police Data Packets on Cisco vEdge Devices
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
105
Forwarding and QoS
Police Data Packets on Cisco vEdge Devices
interface ge0/4
ip address 10.20.24.15/24
no shutdown
access-list acl1 in
!
!
You can also apply a policer directly on an inbound or an outbound interface when you want to police all
traffic ingressing or egressing this interface:
policy
policer p1
rate 1000000
burst 15000
exceed drop
!
!
vpn 1
interface ge0/4
ip address 10.20.24.15/24
no shutdown
policer p1 in
!
!
vpn 2
interface ge0/0
ip address 10.1.15.15/24
no shutdown
policer p1 out
!
!
In the second example, we have a Cisco vEdge device with two WAN interfaces in VPN 0. The ge0/0 interface
connects to a 30-MB link, and we want to always have 10 MB available for very high priority traffic. When
lower-priority traffic bursts exceed 20 MB, we want to redirect that traffic to the second WAN interface,
ge0/1.
For the access list, the configuration snippet below is for interface ge1/0, in VPN 1. The policer monitors
incoming traffic on the interface. When traffic exceeds 20 MB (configured in the policer burst command),
we change the PLP from low to high (configured by the policer exceed remark command). You configure
the following on the Cisco vEdge device:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
106
Forwarding and QoS
Reference: Forwarding and QoS CLI Commands
policy
policer bursty-traffic
rate 1000000
burst 20000
exceed remark
access-list policer-bursty-traffic
sequence 10
match
source-ip 56.0.1.0/24
action accept
policer bursty-traffic
default-action accept
vpn 1
interface ge1/0
ip address 56.0.1.14/24
no shutdown
access-list policer-bursty-traffic in
To display a count of the packets that have been remarked, issue the show interface detail or the show system
statistics command on the Cisco vEdge device. The count is reported in the rx-policer-remark field.
The centralized data policy directs burst traffic away from the ge0/0 interface (color: internet) to interface
ge0/1 (color: red). You apply this data policy to all the routers at a particular site, specifying the direction
from-service so that the policy is applied only to traffic originating from the service side of the router. You
configure the following on the vSmart controller:
policy
lists
site-list highest-priority-routers
site-id 100
vpn-list wan-vpn
vpn 0
data-policy highest-priority
vpn-list wan-vpn
sequence 10
match
plp high
source-ip 56.0.1.0/24
action accept
count bursty-counter
set local-tloc color red
default-action accept
apply-policy
site-list highest-priority-routers
data-policy highest-priority from-service
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
107
Forwarding and QoS
Reference: Forwarding and QoS CLI Commands
Monitoring Commands
Use the following commands to monitor forwarding and QoS on a Cisco XE SD-WAN device:
show sdwan policy access-list-associations
show sdwan policy access-list-counters
show sdwan policy access-list-names
show sdwan policy access-list-policers
show sdwan policy data-policy-filter
show sdwan policy rewrite-associations
show policy-map interface GigabitEthernet0/0/2
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
108
CHAPTER 7
Protocols in Cisco SD-WAN
This chapter discusses the protocols supported in Cisco SD-WAN.
• BFD, on page 109
• EIGRP, on page 112
• Other Supported Protocols, on page 117
BFD
Use the BFD template for vEdge routers and Cisco IOS XE routers.
The BFD protocol, which detects link failures as part of the Cisco SD-WAN high availability solution, is
enabled by default on all vEdge routers, and you cannot disable it.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
109
Protocols in Cisco SD-WAN
BFD
7. In the Template Description field, enter a description of the template. The description can be up to 2048
characters and can contain only alphanumeric characters.
When you first open a feature template, for each parameter that has a default value, the scope is set to Default
(indicated by a check mark), and the default setting or value is shown. To change the default or to enter a
value, click the scope drop-down to the left of the parameter field and select one of the following:
Table 26:
Device Specific Use a device-specific value for the parameter. For device-specific parameters, you
(indicated by a host cannot enter a value in the feature template. You enter the value when you attach a
icon) Viptela device to a device template .
When you click Device Specific, the Enter Key box opens. This box displays a key,
which is a unique string that identifies the parameter in a CSV file that you create.
This file is an Excel spreadsheet that contains one column for each key. The header
row contains the key names (one key per column), and each row after that
corresponds to a device and defines the values of the keys for that device. You
upload the CSV file when you attach a Viptela device to a device template. For
more information, see Create a Template Variables Spreadsheet .
To change the default key, type a new string and move the cursor out of the Enter
Key box.
Examples of device-specific parameters are system IP address, hostname, GPS
location, and site ID.
Global (indicated by a Enter a value for the parameter, and apply that value to all devices.
globe icon)
Examples of parameters that you might apply globally to a group of devices are
DNS server, syslog server, and interface MTUs.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
110
Protocols in Cisco SD-WAN
BFD
Table 27:
Parameter Description
Name
Multiplier Specify the value by which to multiply the poll interval, to set how often application-aware
routing acts on the data plane tunnel statistics to figure out the loss and latency and to
calculate new tunnels if the loss and latency times do not meet configured SLAs.Range: 1
through 6Default: 6
Poll Interval Specify how often BFD polls all data plane tunnels on a vEdge router to collect packet
latency, loss, and other statistics used by application-aware routing.Range: 1 through
4,294,967,296 (232 – 1) millisecondsDefault: 600,000 milliseconds (10 minutes)
Table 28:
Color From the drop-down, choose the color of the transport tunnel for data traffic moving
between vEdge routers. The color identifies a specific WAN transport provider.Values:
3g, biz-internet, blue, bronze, custom1, custom2, custom3, default, gold, green, lte,
metro-ethernet, mpls, private1 through private6, public-internet, red, silverDefault:
default
Hello Interval Specify how often BFD sends Hello packets on the transport tunnel. BFD uses these
packets to detect the liveness of the tunnel connection and to detect faults on the
tunnel.Range: 100 through 60000 millisecondsDefault: 1000 milliseconds (1 second)
Multiplier Specify how many Hello packet intervals BFD waits before declaring that a tunnel has
failed. BFD declares that the tunnel has failed when, during all these intervals, BFD
has received no Hello packets on the tunnel. This interval is a multiplier of the Hello
packet interval time.Range: 1 through 60Default: 7 (for hardware vEdge routers), 20
(for vEdge Cloud software routers)
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
111
Protocols in Cisco SD-WAN
EIGRP
Path MTU Click On to enable path MTU discovery for the transport tunnel, or Off to disable. When
Discovery PMTU discovery is enabled, the path MTU for the tunnel connection is checked
periodically, about once per minute, and it is updated dynamically. When PMTU
discovery is disabled, the expected tunnel MTU is 1472 bytes, but the effective tunnel
MTU is 1468 bytes.Default: Enabled
Add Click Add to save the data traffic transport tunnel color.
EIGRP
Cisco release 19.1 supports Enhanced Interior Gateway Routing Protocol (EIGRP) on Cisco IOS XE devices.
EIGRP is an open standard IGP routing protocol that provides advantages such as:
• Increased network width from 15 to 100 hops
• Fast convergence
• Incremental updates, minimizing bandwidth
• Protocol-independent neighbor discovery
• Easy scaling
Note If your EIGRP network includes vEdge routers, you may need additional software. Refer to SD-WAN 19.1
release notes for configuration information.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
112
Protocols in Cisco SD-WAN
Create an EIGRP Template
Step 6 In the Template Name field, enter a name for the template. The name can be up to 128 characters and can contain only
alphanumeric characters.
Step 7 In the Description field, enter a description of the template. The description can be up to 2048 characters and can contain
only alphanumeric characters.
Basic Configuration
Click the Basic Configuration tab to configure the local autonomous system (AS) number for the template.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
113
Protocols in Cisco SD-WAN
IP4 Unicast Address Family
Redistribute Tab
To redistribute routes from one protocol (routing domain) into a EIGRP routing domain, click New Redistribute
and enter the following parameter values:
Mark as Click Optional to mark this configuration as device-specific. To include this configuration
Optional Row for a device, enter the requested variable values when you attach a device template to a
device, or create a template variables spreadsheet to apply the variables. See Create a
Template Variables Spreadsheet.
Protocol * Select the protocols from which to redistribute routes into EIGRP, for all EIGRP sessions.
ospf Redistribute Open Shortest Path First (OSPF) routes into EIGRP.
Route Policy * Enter the name of the route policy to apply to redistributed routes.
Network Tab
To advertise a prefix into the EIGRP routing domain, click the Network tab, and then click New Network
and enter the following parameter values:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
114
Protocols in Cisco SD-WAN
Advanced Parameters
Network Prefix * Enter the network prefix you want EIGRP to advertise
in the format of prefix/mask.
Advanced Parameters
To configure advanced parameters for EIGRP, click the Advanced tab and configure the following parameter
values:
Hold Time (seconds) Set the interval after which EIGRP considers a
neighbor to be down. The local router then terminates
the EIGRP session to that peer. This acts as the global
hold time.
• Range: 0 through 65,535
• Default: 15 seconds
Hello Interval (seconds) Set the interval at which the router sends EIGRP hello
packets.
• Range: 0 through 65,535
• Default: 5 seconds
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
115
Protocols in Cisco SD-WAN
Route Authentication Parameters
MD5 MD5 Key ID Enter an MD5 key ID to compute an MD5 hash over the
contents of the EIGRP packet using that value.
Note To use a preferred route map, specify both an MD5 key (ID or auth key) and a route map.
Interface Parameters
To configure interface parameters for EIGRP routes, click Interface, and enter the following parameter values:
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
116
Protocols in Cisco SD-WAN
Other Supported Protocols
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
117
Protocols in Cisco SD-WAN
Other Supported Protocols
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
118
CHAPTER 8
QoS on Subinterface
A physical interface may be treated as multiple interfaces by configuring one or more logical interfaces called
subinterfaces. One use case is separating the traffic of different VLANs by using a separate subinterface for
each VLAN.
Quality of Service (QoS) policies may be applied to individual subinterfaces. Configure QoS as usual, specifying
the interface and subinterface using the interface.subinterface notation. For example, for GigabitEthernet
interface 4, subinterface 100:
GigabitEthernet4.100
• Limitations, on page 119
• Configuration Example: QoS on Subinterface, on page 119
Limitations
• Do not configure a QoS policy on both a main interface and one of its subinterfaces. The exception is a
class-default shape policy on the main interface.
• A QoS policy that is applied to a subinterface must have shaping defined. This configured with the shape
command. Example:
policy-map shape_GigabitEthernet4.100
class class-default
service-policy xyz_QoS-model
shape average 100000000
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
119
QoS on Subinterface
Configuration by CLI
Configuration by CLI
class-map match-any DATA
match qos-group 1
class-map match-any Queue0
match qos-group 0
class-map match-any Queue1
match qos-group 1
class-map match-any Queue2
match qos-group 2
class-map match-any Queue7
match qos-group 7
class-map match-any WEB
match qos-group 7
policy-map xyz_QoS-model
class Queue0
priority percent 37
class Queue1
bandwidth percent 33
class Queue7
random-detect
bandwidth percent 10
class class-default
random-detect
bandwidth percent 20
policy-map shape_GigabitEthernet4.100
class class-default
service-policy xyz_QoS-model
shape average 100000000
!
interface GigabitEthernet4.100
no shutdown
encapsulation dot1Q 100
ip address 173.10.0.2 255.255.255.0
ip mtu 1496
service-policy output shape_GigabitEthernet4.100
exit
exit
interface Tunnel3
no shutdown
ip unnumbered GigabitEthernet4.100
tunnel source GigabitEthernet4.100
tunnel mode sdwan
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
120
QoS on Subinterface
Configuration by vManage
exit
sdwan
interface GigabitEthernet4.100
tunnel-interface
encapsulation ipsec
color private3 restrict
max-control-connections 0
policy
class-map
class Queue0 queue 0
class VOICE queue 0
class DATA queue 1
class Queue1 queue 1
class Queue2 queue 2
class Queue7 queue 7
class WEB queue 7
!
Configuration by vManage
To apply a QoS policy to a subinterface using vManage, the procedure is similar to that used for configuring
policies on a main interface. Add a subinterface feature template to the device template for the target device.
This enables loading the QoS policy onto the subinterface.
Preparation
• Configure a QoS Policy
Configuration > Policies > Localized Policy > Custom Options > Forwarding Class/QoS
• Apply a QoS Policy to a Subinterface
Apply a QoS policy and define shaping.
1. Configuration > Feature > feature-name > ACL/QoS
2. Configure the following fields:
• Shaping Rate (Kbps)
• QoS Map
Procedure
This procedure applies a QoS policy to a subinterface.
Prerequisite: One or more class maps have been defined. These assign classes of traffic (for example, VoIP
traffic) to specific queues.
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
121
QoS on Subinterface
Configuration by vManage
2. Create a QoS policy that uses the QoS policy map defined above.
See the documentation for creating a QoS policy.
3. Use a device template to push the QoS policy to the target device.
(Note: The device policy defines other parts of the device configuration also. This procedure only affects
the QoS policy portion.)
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
122
QoS on Subinterface
Configuration by vManage
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
123
QoS on Subinterface
Configuration by vManage
Bridging, Routing, Segmentation, and QoS Configuration Guide for vEdge Routers, Cisco SD-WAN Releases 19.1, 19.2, and 19.3
124